• Title/Summary/Keyword: dedicated management

Search Result 345, Processing Time 0.023 seconds

Investigating the Transfer Status and Improvement Strategies for Records from Defunct Elementary, Middle, and High Schools: After the Enactment of the Public Records Management Act (폐교(초·중·고)기록물 이관현황과 개선방안에 관한 연구: 공공기록물법 제정 이후)

  • Dasom Cheon;Jisue Lee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.113-135
    • /
    • 2023
  • This study explores the transfer of defunct school records (by preservation period, type, and place of transfer) in South Korea since the Public Records Management Act was enacted in 1999 and suggests improvements. Metropolitan and provincial offices of education, totaling 17, were asked to disclose information about the status of defunct school records. Since 1999, 1,411 schools nationwide have closed permanently, predominantly elementary schools, followed by high then middle schools. By preservation period, there were more records in the 1 to 10-year category than in the 30-year to permanent category. By record type, most were electronic records, followed by paper records, archival objects, and audiovisual records. By place of transfer, most nonelectronic records were transferred to integrated schools, and most electronic records were transferred to the Records Management System. In-depth interviews with 10 record managers from local education offices found that the management of defunct school records varies widely by region and institution because of the lack of specified manuals. Participants also reported difficulties in transferring web-based records, archival objects, and audiovisual records, as well as insufficient archival space and computer systems. This study also provides suggestions to improve the management of defunct school records, such as establishing specified manuals, creating a dedicated government department for managing defunct school records, deploying workforces, and improving computer systems.

A STUDY ON NUMERICAL COUPLING BETWEEN MECHANICAL AND HYDRAULIC BEHAVIORS IN A GRANITE ROCK MASS SUBJECT TO HIGH-PRESSURE INJECTION

  • Jeong, Woo-Chang;Jai-Woo;Song, Jai-Woo
    • Water Engineering Research
    • /
    • v.2 no.2
    • /
    • pp.123-138
    • /
    • 2001
  • An injection experiment was carried ut to investigate the pressure domain within which hydromechanical coupling influences considerably the hydrologic behavior of a granite rock mass. The resulting database is used for testing a numerical model dedicated to the analysis of such hydromechanical interactions. These measurements were performed in an open hole section, isolated from shallower zones by a packer set at a depth of 275 m and extending down to 840 m. They consisted in a series of flow meter injection tests, at increasing injection rates. Field results showed that conductive fractures from a dynamic and interdependent network, that individual fracture zones could not be adequately modeled as independent systems, that new fluid intakes zones appeared when pore pressure exceeded the minimum principal stress magnitude in that well, and that pore pressures much larger than this minimum stress could be further supported by the circulated fractures. These characteristics give rise to the question of the influence of the morphology of the natural fracture network in a rock mass under anisotropic stress conditions on the effects of hydromechanical couplings.

  • PDF

Budgeted Memory Allocator for Embedded Systems (내장형 시스템을 위한 Budgeted 메모리 할당기)

  • Lee, Jung-Hee;Yi, Joon-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.2
    • /
    • pp.61-70
    • /
    • 2008
  • Dynamic memory allocators are used for embedded systems to increase flexibility to manage unpredictable inputs and outputs. As embedded systems generally run continuously during their whole lifetime, fragmentation is one of important factors for designing the memory allocator. To minimize fragmentation, a budgeted memory allocator that has dedicated storage for predetermined objects is proposed. A budgeting method based on a mathematical analysis is also presented. Experimental results show that the size of the heap storage can be reduced by up to 49.5% by using the budgeted memory allocator instead of a state-of-the-art allocator. The reduced fragmentation compensates for the increased code size due to budgeted allocator when the heap storage is larger than 16KB.

Ingestive Behavior of Lambs Confined in Individual and Group Stalls

  • Filho, A. Eustaquio;Carvalho, G.G.P.;Pires, A.J.V.;Silva, R.R.;Santos, P.E.F.;Murta, R.M.;Pereira, F.M.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.27 no.2
    • /
    • pp.284-289
    • /
    • 2014
  • The experiment was conducted to evaluate the ingestive behavior of lambs confined in individual and group stalls. We used thirty-four lambs in their growing phase, aged an average of three months, with mean initial live weight of $17.8{\pm}5.2$ kg. They were allotted in a completely randomized design with 24 animals kept in individual stalls and 10 animals confined as a group. The experiment lasted for a total of 74 days, and the first 14 days were dedicated to the animals' adaption to the management, facilities and diets. The data collection period lasted 60 days, divided into three 20-d periods for the behavior evaluation. The animals were subjected to five days of visual observation during the experiment period, by the quantification of 24 h a day, with evaluations on the 15th day of each period and an interim evaluation consisting of two consecutive days on the 30th and 31st day of the experiment. The animals confined as a group consumed less (p<0.05) fiber. However, the animals confined individually spent less (p<0.05) time on feeding, rumination and chewing activities and longer in idleness. Therefore, the lower capacity of lambs confined in groups to select their food negatively affects their feeding behavior.

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.

A Study on the Imperfect Debugging Effect on Release Time of Dedicated Develping Software (불완전디버깅이 주문형 개발소프트웨어의 인도시기에 미치는 영향 연구)

  • Che Gyu Shik
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.87-94
    • /
    • 2004
  • The software reliability growth model(SRGM) has been developed in order to estimate such reliability measures as remaining fault number, failure rate and reliability for the developing stage software. Almost of them assumed that the faults detected during testing were evetually removed. Namely, they have studied SRGM based on the assumption that the faults detected during testing were perfectly removed. The fault removing efficiency. however. IS imperfect and it is widely known as so in general. It is very difficult to remove detected fault perfectly because the fault detecting is not easy and new error may be introduced during debugging and correcting. Therefore, the fault detecting efficiency may influence the SRGM or cost of developing software. It is a very useful measure for the developing software. much helpful for the developer to evaluate the debugging efficiency, and, moreover, help to additional workloads necessary. Therefore. it is very important to evaluate the effect of imperfect dubugging in point of SRGM and cost. and may influence the optimal release time and operational budget. I extent and study the generally used reliability and cost models to the imperfect debugging range in this paper.

  • PDF

Extended Kalman Filter Method for Wi-Fi Based Indoor Positioning (Wi-Fi 기반 옥내측위를 위한 확장칼만필터 방법)

  • Yim, Jae-Geol;Park, Chan-Sik;Joo, Jae-Hun;Jeong, Seung-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.2
    • /
    • pp.51-65
    • /
    • 2008
  • The purpose of this paper is introducing WiFi based EKF(Extended Kalman Filter) method for indoor positioning. The advantages of our EKF method include: 1) Any special equipment dedicated for positioning is not required. 2) implementation of EKF does not require off-line phase of fingerprinting methods. 3) The EKF effectively minimizes squared deviation of the trilateration method. In order to experimentally prove the advantages of our method, we implemented indoor positioning systems making use of the K-NN(K Nearest Neighbors), Bayesian, decision tree, trilateration, and our EKF methods. Our experimental results show that the average-errors of K-NN, Bayesian and decision tree methods are all close to 2.4 meters whereas the average errors of trilateration and EKF are 4.07 meters and 3.528 meters, respectively. That is, the accuracy of our EKF is a bit inferior to those of fingerprinting methods. Even so, our EKF is accurate enough to be used for practical indoor LBS systems. Moreover, our EKF is easier to implement than fingerprinting methods because it does not require off-line phase.

  • PDF

An Empirical study on improvement of operation for feeder vessel route between Busan and west coast of Japan

  • Kim, Sang-Youl;Kim, Dong-Jin;Ryoo, Dong-Keun;Yoo, Yong-Joo
    • Journal of Navigation and Port Research
    • /
    • v.35 no.7
    • /
    • pp.605-611
    • /
    • 2011
  • In this paper, practical problems for current feeder service between Busan port and west coast of Japan were extracted through in depth interviews with Japanese feeder vessel companies, shippers, and port authority based upon which major criteria (elements) for improvement of the feeder network are structured in hierarchic order and weighed relative importance through AHP method. From the questionnaire answered by Korean and Japanese port users and experts the weights of criteria were calculated and the shipping service was ranked the first by both parties with 0.235 and 0.217, respectively. The port service and support system ranked the second and the third, whereas the port marketing was shown to be the lowest of all. Considering the overall weights, the increase in a port loading and unloading speed of port service was followed by provision of dedicated deck for feeder vessel of port facilities for Korean respondents. Therefore, speed up of the port operations and providing docks for feeder vessel are to be firstly provided for more efficient feeder operations, which would be the basis for the construction of optimal transportation network.

A Study on the XML/EDI (XML/EDI에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.109-124
    • /
    • 2001
  • Electronic Data Interchange (EDI) has been used for business-to-business communication for almost a quarter of a century. Initial efforts Involved inter-company agreements on how to exchange commercial data, initially as information stored on tape and later as messages sent over dedicated data lines. To avoid having to use different protocols to move data between different companies, various Industry groups identified sets of data that could form the basis of individual agreements. The industry groups also sought to agree the format in which fields in such data sets were interchange so that a company only needed to develop one methodology for decoding information received without resource to human intervention. The XML/EDI specific components are built on top of existing standards for transmitting and processing XML-encoded data. These standards define shared features such as: the standard Internet file storage/naming and data transport mechanisms, file and message transfer formats, the syntax of data coded in XML, the way in which XML files can be validated by an XML parser or document object model generator, the way in which XSL presentation and data evaluation scripts can be associated with parsed objects, the use of rules and data management robots to manage application and repository interfaces.

  • PDF

Reverse Logistics Network Design with Incentive-Dependent Return

  • Asghari, Mohammad;Abrishami, Salman J.;Mahdavi, Faezeh
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.4
    • /
    • pp.383-397
    • /
    • 2014
  • Reverse logistics network design issues have been popularly discussed in recent years. However, few papers in the past literature have been dedicated to incentive effect on return quantity of used products. The purpose of this study is to formulate a dynamic nonlinear programming model of reverse logistics network design with the aim of managing the used products allocation by coordinating the collection centers and recovery facilities to warrant economic efficiency. In the optimization model, a fuzzy approach is applied to interpret the relationship between the rate of return and the suggested incentives. Due to funding constraints in setting up the collection centers, this work considers these centers as multi-capacity levels, which can be opened or closed at different periods. In view of the fact that the problem is known as NP-hard, we propose a heuristic method based on tabu search procedure to solve the presented model. Finally, several dominance properties of optimal solutions are demonstrated in comparison with the results of a state-of-the-art commercial solver.