• Title/Summary/Keyword: check-all-that-apply

Search Result 56, Processing Time 0.023 seconds

Quality Improvement of Greenhouse Gas Inventories by the Use of Bottom-Up Data (상향식 자료를 이용한 온실가스 인벤토리의 품질 개선 방향 - 화학, 금속 분야를 중심으로 -)

  • Choi, Eunhwa;Shin, Eunseop;Yi, Seung-Muk
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.30 no.2
    • /
    • pp.161-174
    • /
    • 2014
  • The methodology report '2006 IPCC Guidelines for National Greenhouse Gas Inventories' shows higher tier method can be a good practice, which uses country-specific or plant-specific data when calculating greenhouse gas emissions by country. We review the methodology report to present principles of using plant-level data and also examine examples of using plant-level data in chemical and metal industry in 20 countries for the purpose of quality improvement of national greenhouse gas inventories. We propose that Korea consider utilizing plant-level data, as reported according to 'Greenhouse gas and Energy Target Management Scheme', in the following order as a preference. First, the data can be utilized for quality control of Korea's own parameters, when Tier 2 method is adopted and bottom-up approach is not applicable. Second, both plant-level data and IPCC default data can be used together, combining Tier 1 method with Tier 3 method. Third, we can also use acquired plant-level data and country specific parameters, combining Tier 2 method with Tier 3 method. Fourth, if the plant-level data involves all categories of emissions and the data is proven to be representative, we can apply Tier 3 method. In this case, we still need to examine the data to check its reliability by a consistent framework, including appropriate quality control.

Factor Analysis for Exploratory Research in the Distribution Science Field (유통과학분야에서 탐색적 연구를 위한 요인분석)

  • Yim, Myung-Seong
    • Journal of Distribution Science
    • /
    • v.13 no.9
    • /
    • pp.103-112
    • /
    • 2015
  • Purpose - This paper aims to provide a step-by-step approach to factor analytic procedures, such as principal component analysis (PCA) and exploratory factor analysis (EFA), and to offer a guideline for factor analysis. Authors have argued that the results of PCA and EFA are substantially similar. Additionally, they assert that PCA is a more appropriate technique for factor analysis because PCA produces easily interpreted results that are likely to be the basis of better decisions. For these reasons, many researchers have used PCA as a technique instead of EFA. However, these techniques are clearly different. PCA should be used for data reduction. On the other hand, EFA has been tailored to identify any underlying factor structure, a set of measured variables that cause the manifest variables to covary. Thus, it is needed for a guideline and for procedures to use in factor analysis. To date, however, these two techniques have been indiscriminately misused. Research design, data, and methodology - This research conducted a literature review. For this, we summarized the meaningful and consistent arguments and drew up guidelines and suggested procedures for rigorous EFA. Results - PCA can be used instead of common factor analysis when all measured variables have high communality. However, common factor analysis is recommended for EFA. First, researchers should evaluate the sample size and check for sampling adequacy before conducting factor analysis. If these conditions are not satisfied, then the next steps cannot be followed. Sample size must be at least 100 with communality above 0.5 and a minimum subject to item ratio of at least 5:1, with a minimum of five items in EFA. Next, Bartlett's sphericity test and the Kaiser-Mayer-Olkin (KMO) measure should be assessed for sampling adequacy. The chi-square value for Bartlett's test should be significant. In addition, a KMO of more than 0.8 is recommended. The next step is to conduct a factor analysis. The analysis is composed of three stages. The first stage determines a rotation technique. Generally, ML or PAF will suggest to researchers the best results. Selection of one of the two techniques heavily hinges on data normality. ML requires normally distributed data; on the other hand, PAF does not. The second step is associated with determining the number of factors to retain in the EFA. The best way to determine the number of factors to retain is to apply three methods including eigenvalues greater than 1.0, the scree plot test, and the variance extracted. The last step is to select one of two rotation methods: orthogonal or oblique. If the research suggests some variables that are correlated to each other, then the oblique method should be selected for factor rotation because the method assumes all factors are correlated in the research. If not, the orthogonal method is possible for factor rotation. Conclusions - Recommendations are offered for the best factor analytic practice for empirical research.

Comparison of work measures for some physician services in Obstetrics & Gynecology (산부인과 의사의 일부 서비스 진료업무량 측정방법 비교에 관한 연구)

  • Hur, Yeong-Joo;Sohn, Myong-Sei;Park, Eun-Cheol;Kang, Hyung-Gon;Kim, Han-Joong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.28 no.3 s.51
    • /
    • pp.623-639
    • /
    • 1995
  • We have never seen any method to cope basically with complicated situation and problems around medical reimbursement rates here in Korea since 1977 witnessed by the beginning of medical insurance. By the way researchers concerned are beginning to propose some kinds of innovative and detailed ideas to government these days. They are Diagnosis-related group(DRG) and Resource-based .elative value scale(RBRVS). In the light of this situation it is so encouraging that our government can come up with that and move. In case of RBRVS research we have already been reaching even to the level of reviewing and revising methodology for its further development after naive pilot study on internal medicine and general surgery last year. However there might be something different conditions between USA and Korea to apply the same Dr. Hsiao's method and it must be vital to check so called' total work approach' compared with 'intra-service work approach' before expanding to the whole medical fields. According to the' Intra-service approach', the physician's work is supposed to be divided into three sub-works by the name of intraservice work, pre, and post service work. These sub-works, again should be merged together to be the pre-postwork subset through some statistical methods of the estimation process applied by Dr. Hsiao's methodology in RBRVS development later on. But in this paper that estimation process was not taken because we could have real values for all of those surveyed items related to just one specialty, OB & GY. Instead, We used some statistical comparison procedures relevant to demographic characteristics, reliability & validity and correlation analysis with American RVU(Relative value unit) between the total work and merged total work from intraservice work approach. The unit of analysis was individual physicians of OB & GY and 300 physicians were selected for each approach through statistical sampling method based on national population of OB & GY physicians in Korea. And also with the thankful help of Advisory Committee under Korean Association of OB & GY, questionnaires were made and mailed to the subjects, two times. As a result there were not any statistically significant differences in demographic characteristics between the two approaches except for the variable 'Response time for the questionnaires', but in other sections of comparisons, response rate, representative values, reliability & validity test, correlation analysis with American RVU, all showed 'Total approach' was not only more rational and statistically meaningful than 'Intra-service approach' but also had considerable merits. But we are not absolutely sure about this paper's robustness. Because of some limitations, we'd rather like to suggest further researches should be followed. In that sense the first thing would be a research for the influence of doctor's characteristics, especially 'frequency' on the rating of work and the way to define total work more clearly.

  • PDF

Profiling Approach for the Choice between Speculation and Postponement Strategy in Supply Chain Management (공급사슬관리의 예측전략과 지연전략 선택을 위한 프로파일링 접근법)

  • Kang, Sung-Wook;Kim, Gyu-Bae
    • Journal of Distribution Science
    • /
    • v.12 no.4
    • /
    • pp.47-54
    • /
    • 2014
  • Purpose - The postponement strategy, which delays the form, place, and production of products as late as possible, has been widely considered as a competitive supply chain management scheme in an era of mass customization and modular manufacturing. An interesting business phenomenon is that not all manufacturing/logistics firms choose the postponement strategy. Given that postponement is a counter-measure to speculation, which has some advantages under certain environments, the current imprudent inclination toward the postponement strategy may cause firms to lose the potential of the speculation strategy, an alternative strategy in supply chain management. Building on the logistics and manufacturing literature, this study examines characteristics of two contrasting strategies, postponement and speculation, and major factors favoring each strategy. Research design, data, and methodology - We apply the profiling approach to two business cases, HP printer and LG mobile phone. The profiling approach is a method of choosing a particular strategy aligned with environmental factors. While various approaches have been used to check the fit between a business strategy and environmental factors, the literature on manufacturing strategy and logistics has commonly adopted the profiling approach. Major factors used in profiling variables are derived from the literature. Two samples, HP printer and LG mobile phone, are selected, because they represent major characteristics appropriate for each strategy. The profiling is based on data from semi-organized interviews with managers. Results - The profiling approach shows that the postponement strategy is a suitable one for HP printers. Most factors, such as product life cycle, large production volume, low-price, product value, and monetary density, support delaying end products until as late as possible. Despite some exceptions, such as delivery time and economy of scale, our analysis states that the overall profile of HP printer is favorable for the postponement strategy. On the other hand, LG mobile phone may adapt the speculation strategy. Although it has large production volume and low delivery frequency, most characteristics support the speculation strategy for this product. An interesting finding is that, despite common perception that advanced technology products such as mobile telephones favor the postponement strategy, profiling proposes the speculation strategy for this product. Conclusions - Our analysis shows that speculation is not the universal option for supply chain management, and that, when choosing a specific strategy, one should consider many factors simultaneously. A major implication of our work is to emphasize the role of environmental factors such as supply chain variables in choosing an inventory strategy, and the importance of fit rather than solely strategic orientation. A theoretical contribution is to demonstrate the benefit of the simultaneous consideration of business variables in choosing specific strategies. For practitioners, our work leads us to consider the existence and the potential of speculation as a counter-measure to postponement. In addition, the comprehensive framework in this research may be instantly used in examining a practical strategy.

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity (정보자산 보호를 위한 표준 보안정책 모듈화 기법 적용과 기밀성 및 무결성 확보를 위한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.

A Study on the Strength Evaluation Method of Plate Structures with Penetration-holes (관통구를 갖는 판구조물의 강도평가 방법에 관한 연구)

  • Kim, Ul-Nyeon;Jang, Jun-Tae
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.54 no.6
    • /
    • pp.476-484
    • /
    • 2017
  • The purpose of this paper is to verify the structural integrity of a region with numerous penetration-holes in offshore structures such as semi-submersible rig and FPSO. In order to effectively check the yielding and buckling strength of plate members with penetration-holes, a screening analysis program was developed with the FE analysis tool to generate fine meshed model using the theoretical and analysis methods. When a hole is appeared in the plate structure members, the flow of stress is altered such that concentrations of stress form near the hole. Stress concentrations are of concern during both preliminary and detail design and need to be addressed from the perspectives of strength. To configure the geometrical shape, very fine meshed FE analysis is needed as the most accurate method. However, this method is practically impossible to apply for the strength verifications for all perforated plates. In this paper, screening analysis method was introduced to reduce analysis tasks prior to detailed FE analysis. This method is applied to not only the peak stress calculation combined stress concentration factor with nominal stress but also nominal equivalent stress calculation considering cutout effects. The areas investigated by very fine meshed analysis were to be chosen through screening analysis without any reinforcements for penetration-holes. If screening analysis results did not satisfy the acceptance criteria, direct FE analysis method as the 2nd step approach were applied with one of the coarse meshed model considering hole or with the very fine meshed model considering the hole shape and size. In order to effectively perform the local fine meshed analysis, automatic model generating program was developed based on the MSC/PATRAN which is pre-post FE analysis program. Buckling strength was also evaluated by Common Structure Rule (CSR) adopted by IACS as the stress obtained from very fine meshed FE analysis. Due to development of the screening analysis program and automatic FE modeling program, it was able to reduce the design periods and structural analysis costs.

Air Carrier's Civil Liability for Overbooking (항공권의 초과예약(Overbooking)에 관한 항공사의 민사책임)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.1
    • /
    • pp.99-144
    • /
    • 2016
  • The summary of the case is as follows: a Korean passenger booked and purchased a business class ticket from Air France that was scheduled to depart from Paris and arrive in Seoul. When the passenger arrived at the check-in counter, he was told that all business class seats were occupied. It was because the flight was overbooked by Air France. The passenger cancelled the Air France flight and took another air carrier. After arriving in Korea, he brought suit against Air France for damages. The purpose of this article is to discuss the governing law when interpreting the contract of international air carriage in accordance with the Korean Private International Act (2001) and to analyze air carrier's civil liability for the bumped passenger in the overbooking case. If the parties have not chosen the applicable law the contract shall be governed by the law of the habitual residence of the consumer in the following situations: prior to the conclusion of the contract, the opposite party of the consumer conducted solicitation of transactions and other occupational or business activities by an advertisement in that country or conducted solicitation of transactions and other occupational or business activities by an advertisement into that country from the areas outside that country and the consumer took all the steps necessary for the conclusion of the contract in that country or in case the opposite party of the consumer received an order of the consumer in that country [Article 27 (1), (2) of the Private International Act]. Since the contract of international carriage falls into the consumer contract, the Supreme Court viewed that the governing law of the contract in this case would be the law of the habitual residence of the consumer (Supreme Court Decision 2013Da8410 decided on Aug. 28, 2014). This interpretation differs from the article 5 (4) of Rome Convention(80/934/EEC) which declares that the consumer contract article shall not apply to neither a contract of carriage nor a contract for the supply of services where the services are to be supplied to the consumer exclusively in a country other than that in which he has his habitual residence. Even though overbooking can be considered as a common industry practice, an air carrier must burden civil liability in case of breach of contract for the involuntary bumped passenger(Seoul Central District Court Decision 2014Na48391 decided on Jan. 29, 2015). In case of involuntary bumping, an air carrier must offer re-routing to passenger's final destination by an alternative flight. If an air carrier fails to effect performance in accordance with the tenor and purport of the obligation, the involuntary bumped passenger may claim damages(Article 390 of the Civil Code).

The Limitation of Air Carriers' Cargo and Baggage Liability in International Aviation Law: With Reference to the U.S. Courts' Decisions (국제항공법상 화물.수하물에 대한 운송인의 책임상한제도 - 미국의 판례 분석을 중심으로 -)

  • Moon, Joon-Jo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.109-133
    • /
    • 2007
  • The legal labyrinth through which we have just walked is one in which even a highly proficient lawyer could easily become lost. Warsaw Convention's original objective of uniformity of private international aviation liability law has been eroded as the world community ha attempted again to address perceived problems. Efforts to create simplicity and certainty of recovery actually may have created less of both. In any particular case, the issue of which international convention, intercarrier agreement or national law to apply will likely be inconsistent with other decisions. The law has evolved faster for some nations, and slower for others. Under the Warsaw Convention of 1929, strict liability is imposed on the air carrier for damage, loss, or destruction of cargo, luggage, or goods sustained either: (1) during carriage in air, which is comprised of the period during which cargo is 'in charge of the carrier (a) within an aerodrome, (b) on board the aircraft, or (c) in any place if the aircraft lands outside an aerodrome; or (2) as a result of delay. By 2007, 151 nations had ratified the original Warsaw Convention, 136 nations had ratified the Hague Protocol, 84 had ratified the Guadalajara Protocol, and 53 nations had ratified Montreal Protocol No.4, all of which have entered into force. In November 2003, the Montreal Convention of 1999 entered into force. Several airlines have embraced the Montreal Agreement or the IATA Intercarrier Agreements. Only seven nations had ratified the moribund Guatemala City Protocol. Meanwhile, the highly influential U.S. Second Circuit has rendered an opinion that no treaty on the subject was in force at all unless both affected nations had ratified the identical convention, leaving some cases to fall between the cracks into the arena of common law. Moreover, in the United States, a surface transportation movement prior or subsequent to the air movement may, depending upon the facts, be subject to Warsaw, or to common law. At present, International private air law regime can be described as a "situation of utter chaos" in which "even legal advisers and judges are confused." The net result of this barnacle-like layering of international and domestic rules, standards, agreements, and criteria in the elimination of legal simplicity and the substitution in its stead of complexity and commercial uncertainty, which manifestly can not inure to the efficient and economical flow of world trade. All this makes a strong case for universal ratification of the Montreal Convention, which will supersede the Warsaw Convention and its various reformulations. Now that the Montreal Convention has entered into force, the insurance community may press the airlines to embrace it, which in turn may encourage the world's governments to ratify it. Under the Montreal Convention, the common law defence is available to the carrier even when it was not the sole cause of the loss or damage, again making way for the application of comparative fault principle. Hopefully, the recent entry into force of the Montreal Convention of 1999 will re-establish the international legal uniformity the Warsaw Convention of 1929 sought to achieve, though far a transitional period at least, the courts of different nations will be applying different legal regimes.

  • PDF

Development of Standard Process for Private Information Protection of Medical Imaging Issuance (개인정보 보호를 위한 의료영상 발급 표준 업무절차 개발연구)

  • Park, Bum-Jin;Yoo, Beong-Gyu;Lee, Jong-Seok;Jeong, Jae-Ho;Son, Gi-Gyeong;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.32 no.3
    • /
    • pp.335-341
    • /
    • 2009
  • Purpose : The medical imaging issuance is changed from conventional film method to Digital Compact Disk solution because of development on IT technology. However other medical record department's are undergoing identification check through and through whereas medical imaging department cannot afford to do that. So, we examine present applicant's recognition of private intelligence safeguard, and medical imaging issuance condition by CD & DVD medium toward various medical facility and then perform comparative analysis associated with domestic and foreign law & recommendation, lastly suggest standard for medical imaging issuance and process relate with internal environment. Materials and methods : First, we surveyed issuance process & required documents when situation of medical image issuance in the metropolitan medical facility by wire telephone between 2008.6.1$\sim$2008.7.1. in accordance with the medical law Article 21$\sim$clause 2, suggested standard through applicant's required documents occasionally - (1) in the event of oneself $\rightarrow$ verifying identification, (2) in the event of family $\rightarrow$ verifying applicant identification & family relations document (health insurance card, attested copy, and so on), (3) third person or representative $\rightarrow$ verifying applicant identification & letter of attorney & certificate of one's seal impression. Second, also checked required documents of applicant in accordance with upper standard when situation of medical image issuance in Kyung-hee university medical center during 3 month 2008.5.1$\sim$2008.7.31. Third, developed a work process by triangular position of issuance procedure for situation when verifying required documents & management of unpreparedness. Result : Look all over the our manufactured output in the hospital - satisfy the all conditions $\rightarrow$ 4 place(12%), possibly request everyone $\rightarrow$ 4 place(12%), and apply in the clinic section $\rightarrow$ 9 place(27%) that does not medical imaging issuance office, so we don't know about required documents condition. and look into whether meet or not the applicant's required documents on upper 3month survey - satisfy the all conditions $\rightarrow$ 629 case(49%), prepare a one part $\rightarrow$ 416 case(33%), insufficiency of all document $\rightarrow$ 226case(18%). On the authority of upper research result, we are establishing the service model mapping for objective reception when image export situation through triangular position of issuance procedure and reduce of friction with patient and promote the patient convenience. Conclusion : The PACS is classified under medical machinery that mean indicates about higher importance of medical information therefore medical information administrator's who already received professional education & mind, are performer about issuance process only and also have to provide under ID checking process exhaustively.

  • PDF

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.