• Title/Summary/Keyword: contract method

Search Result 532, Processing Time 0.026 seconds

Design and Implement of Power-Data Processing System with Optimal Sharding Method in Ethereum Blockchain Environments

  • Lee, Taeyoung;Park, Jaehyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.143-150
    • /
    • 2021
  • In the recent power industry, a change is taking place from manual meter reading to remote meter reading using AMI(Advanced Metering Infrastructure). If such the power data generated from the AMI is recorded on the blockchain, integrity is guaranteed by preventing forgery and tampering. As data sharing becomes transparent, new business can be created. However, Ethereum blockchain is not suitable for processing large amounts of transactions due to the limitation of processing speed. As a solution to overcome such the limitation, various On/Off-Chain methods are being investigated. In this paper, we propose a interface server using data sharding as a solution for storing large amounts of power data in Etherium blockchain environments. Experimental results show that our power-data processing system with sharding method lessen the data omission rate to 0% that occurs when the transactions are transmitted to Ethereum and enhance the processing speed approximately 9 times.

Comparative Evaluation on the Deriving Method of the Heat Transfer Coefficient of the C-D Nozzle (축소 확대 노즐의 열전달 해석을 위한 열전달 계수 계산 및 검증)

  • Noh, Tae Won;Roh, Tae-Seong;Lee, Hyoung Jin;Lee, Hyunseob;Yoo, Phil Hoon
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.26 no.2
    • /
    • pp.1-11
    • /
    • 2022
  • The heat transfer coefficient on the wall, which is used as a boundary condition in the thermal analysis of general contract-divergent supersonic nozzles, affects the thermal analysis accuracy of the entire nozzle. Accordingly, many methods of deriving a heat transfer coefficient have been proposed. In this study, the accuracy of each method was compared. For this purpose, the heat transfer coefficients were calculated through theoretical-based analogy methods, semi-empirical equations, and CFD simulations for the previously performed heat transfer experiment with an isothermal wall and compared with the experimental results. The results show that the Prandtl-Taylor analogy methods and the CFD results with the k-ω SST turbulence model were in good agreement with the experimental results. Furthermore, the Modified Bartz empirical formula showed an overall over-prediction tendency.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

A Study on Method Activation of Construction Management through Investigation of Public Owners' Capability level (공공부문의 발주자 역량 수준 조사를 통한 건설사업관리 활성화 방안 연구)

  • Kim, Sun-Sik;Kim, Ju-Hyun;Lee, Yun-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.289-294
    • /
    • 2007
  • It has been 10 years Since December 1996 when CM method was institutionalized by Construction Industry Fundamental law. Even though construction market has been in stagnant of business activities till now, CM in Korea started to be activated by the introduction of CM method i.n public construction. In the end of 2005, the number of CM order's contract is 6.7 times , an amount of CM order's money is 9.2 times more than operation plan of CM system announced in 2001. Therefore, CM market has been dramatically growing. However, it is judged that the shortage of faith in CM project and necessity of CM method are not recognized and study on a owner who affects successful settlement of CM has not been performed. When considering those points, in introduction and practical use of CM, CM is suggested to the field which is necessary for a client through the task performance level research and analysis of a owner who act a important role to activate Construction Management. As result of studying pre-existing papers to i.nvestigate of owner's capability level, the task function of a client is classified into 10 types and a public opinion poll was performed based on the 10 types of function.

  • PDF

A Study on Analysis of Construction Monitoring Cost and Improvement Measures of Railway Tunnel Construction in Seoul (서울시 철도터널 건설공사의 공사계측비 분석 및 개선방안 연구)

  • Jong-Tae Woo
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.18-30
    • /
    • 2023
  • Purpose: This study is to contribute to the development of monitoring technology through the increase of confidence in construction monitoring by deriving the analysis of construction monitoring cost and improvement measures of railway tunnel construction in Seoul. Method: It presents the status on design and contract of construction monitoring cost, status on application construction monitoring cost and its analysis, analysis on safety management cost and quality management cost, expansion of application of the price calculation standard for monitoring management services to improve this, and monitoring for direct order of ordering organization. Results: If the monitoring management service that was meanwhile ordered as included in the construction work is performed by the directly selected company of ordering organization through the preliminary screening for bidding qualification, then the improvement of monitoring quality and the accurate monitoring data can be secured. Conclusion: For the price calculation standard for monitoring management service, the application of actual cost addition method under the Engineering Promotion Act and the calculation standard of monitoring management cost for standard estimation for ground survey should be extended through the direct order of ordering organization, not the method to be included in the net construction cost where it is performed by a subcontractor via contractor.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

A Study on the Determination of Applicable Law to the Arbitration Agreement in International Arbitration (국제중재에 있어서 중재합의의 준거법 결정에 관한 연구)

  • Lee Kang-Bin
    • Journal of Arbitration Studies
    • /
    • v.15 no.2
    • /
    • pp.197-224
    • /
    • 2005
  • The purpose of this paper is to make research on the party's autonomy principle and the applicable law to the arbitration agreement, the applicable law to the validity of the arbitration agreement, the applicable law to the arbitrability of the arbitration agreement, the applicable law to the contracting ability of the arbitration agreement, and the applicable law to the method of the arbitration agreement. If no choice of law is made by the parties with respect to the arbitration agreement-which is the stand situation-the validity of the agreement may have to decided under its proper law, or under the law of the place of arbitration, or the law of the place of enforcement. If the subject matter is not arbitrable, the arbitration agreement remains without effect. The rules determining arbitrability may differ from one country to another, from one legal system to another. If a party is lacking capacity to enter into an arbitration agreement, the recognition and enforcement of the arbitral award may be refused at the request of the party against whom it is invoked. This principle is laid down in the New Yark Convention on the Recognition and Enforcement of Foreign Arbitral Awards. The validity of an arbitration agreement sometimes also depends on the form in which it is made. Article II. 2 of the New York Convention states that the term 'agreement in writing' shall include an arbitral clause in a contract or an arbitration agreement, signed by the parties of contained in exchange of letters or telegrams.

  • PDF

A Case Study on Multiple-deck-charge Blasting with Electronic Detonators (전자뇌관과 다단장약을 이용한 발파 사례 연구)

  • Ko, Tae Young;Shin, Chang Oh;Lee, Hyo;Lee, Seung Cheol
    • Explosives and Blasting
    • /
    • v.30 no.2
    • /
    • pp.52-58
    • /
    • 2012
  • A TBM launching shaft in DTL2 Contract 915 site is located in a typical hard Bukit Timah granite formation and lots of blasting work is required for shaft sinking. The original blast design used the electric detonator and ANFO blasts consisting of 30 holes per one blast with 1.5 m depth of drilling hole. However, significant delay of work and poor progress were expected due to the limitation of the number of blasting hole and strict vibration regulation on retaining systems. To overcome such constraints, an efficient new blasting method which can improve productivity and satisfy vibration limit was required. The revised blast design, using triple-deck blasts with electronic detonators and cartridge emulsion explosives, gives better construction performance and can reduce construction time. Such a new blasting technique can be effectively used for similar underground projects in the future where the volume of rock blasting is significant.

Foodservice Systems of Meal Service Programs for Mental Disorder Care Sites in Korea (한국 정신요양시설의 급식 서비스 현황 분석)

  • Lee, Jin-Mi
    • Journal of the Korean Dietetic Association
    • /
    • v.7 no.1
    • /
    • pp.80-86
    • /
    • 2001
  • The purposes of this study were to: a) examine characteristics of foodservice management practices; b) investigate characteristics of recipients; c) analyze foodservice systems; and d) provide feedback for the efficient and effective foodservice management of mental disorder care sites in Korea. A total of 46 sites was analyzed by questionnaire survey. Statistical data analysis was completed using the SPSS package program for descriptive analysis. As results of site recipients' characteristics, 60% of total sites were males and 40% were female recipients. Average 60% of recipients were from 30 to 40 years old. Major diseases of recipients were mental disorder, high pressure, and obesity. According to the result of foodservice system analysis, the average meal cost per day was about 2,921 won and average food cost percentage was 39%. Average number of meals per day was about 600 meals. All sites had on dietitian and 88.3% of sites had one cook as a full-time employees. In the part of procurement, dietitians were major chargers of sites for purchasing foods. Major purchasing method was the order and delivery contract. About a half of sites used cycle menu system and standardized recipies. Most of sites had recipients survey systems for evaluating meal satisfaction. About 60% of sites provided liquid diets to recepients and 22% provided diabetic diets. Dietitians at sites had problems on low meal cost budget, lack of cooking professionals, and lack of information about treatment meals for mental disorders for providing higher quality of foods cure recipients. The results suggested that financial and systematical supports by the government would be very necessary to meet the goal of nutritional balanced meal services.

  • PDF