• Title/Summary/Keyword: store methods

Search Result 476, Processing Time 0.026 seconds

Historical Sensor Data Management Using Temporal Information (센서 데이터의 시간 정보를 이용한 이력 정보 관리)

  • Lee, Yang-Koo;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.97-102
    • /
    • 2008
  • A wireless sensor network consists of many sensors that collect and transmit physical or environmental conditions at different locations to a server continuously. Many researches mainly focus on processing continuous queries on real-time data stream. However, they do not concern the problem of storing the historical data, which is mandatory to the historical queries. In this paper, we propose two time-based storage methods to store the sensor data stream and reduce the managed tuples without any loss of information, which lead to the improvement of the accuracy of query results.

  • PDF

Conditions of Workplace Violence Experience among Workers in the Distribution Industry (유통업 근로자의 직장폭력 경험 실태)

  • Kim, Souk Young;Yun, Soon-Nyung
    • Research in Community and Public Health Nursing
    • /
    • v.23 no.2
    • /
    • pp.212-221
    • /
    • 2012
  • Purpose: The purpose of this study is to explore violence experienced by workers in the distribution industry. Methods: The research subjects were 236 workers from 2 department stores and 1 large scale discount store located in Daejeon City, Korea. The collected data were analyzed through descriptive statistics, $x^2$-test, and logistic regression analysis. Results: 72.9% of the research subjects experienced verbal violence, and 9.3% of the respondents experienced physical violence during last year. 17.8% of the respondents reported that they had experience of sexual harassment at their workplaces. The variables which affected verbal violence included working departments and stress level, whereas the variable that affected physical violence was educational level of workers. The variables that affected experience of sexual harassment turned out to be gender as well as the duration of work at the current workplaces. Conclusion: The findings from this research revealed that many of the workers engaged in the distribution industry were exposed to workplace violence. For the reduction of risk of workplace violence for these workers, it is required to develop and execute programs including violence related policies and education about workplace violence.

Consumers’Purchasing Process of Fashion Products on the Internet: A Qualitative Approach (인터넷을 통한 패션상품 구매행동의 탐색적 연구)

  • 김현정;이은영;박재옥
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.6
    • /
    • pp.907-917
    • /
    • 2000
  • Although interest in the potential and actual usage of the Internet as a transaction medium is increasing, the market for fashion merchandise on the Internet in Korea has yet to take off. As the Internet environment is expected to bring about a transformation of conventional consumer buying behavior, the purpose of this exploratory research is to investigate the buying behavior of fashion products on the Internet to identify relevant concepts and generate hypotheses for further empirical research. The research methods selected for the study were observation and in-depth interview. Twelve subjects who had purchased fashion products on the Internet were selected and interviewed. Those who could not participate in face-to-face in-depth interviews because of the geographic locations were interviewed on-line. The results are as follows: First, subjects went through the stages of shopping motivation stage, site choice behavior stage, in-site behavior stage, and postpurchase behavior stage. Second, a model was extracted for each shopping stage, and a final model was completed based on comparisons with the participants processes. The information content of each phase was discussed. Finally, each participant was classified using their purchasing process, revealing six possible mixed usage patterns of the Internet marketing system and the traditional marketing system.

  • PDF

An Efficient Complex Event Processing Algorithm based on INFA-HTS for Out-of-order RFID Event Streams

  • Wang, Jianhua;Wang, Tao;Cheng, Lianglun;Lu, Shilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4307-4325
    • /
    • 2016
  • With the aim of solving the problems of long processing times, high memory consumption and low event throughput in the current processing approaches in out-of-order RFID event streams, an efficient complex event processing method based on INFA-HTS (Improved Nondeterministic Finite Automaton-Hash Table Structure) is presented in this paper. The contribution of this paper lies in the fact that we use INFA and HTS to successfully realize the detection of complex events for out-of-order RFID event streams. Specifically, in our scheme, to detect the disorder of out-of-order event streams, we expand the traditional NFA model into a new INFA model to capture the related RFID primitive events from the out-of-order event stream. To high-efficiently manage the large intermediate capturing results, we use the HTS to store and process them. As a result, these problems in the existing methods can be effectively solved by our scheme. The simulation results of our experiments show that our proposed method in this paper outperforms some of the current general processing approaches used to process out-of-order RFID event streams.

Prediction of Air Movement and Temperature Distribution at Different Store Methods Using 3-D CFD Simulation in Forced-Air Cooling Facility

  • Yang, G.M.;Koh, H.K.
    • Agricultural and Biosystems Engineering
    • /
    • v.3 no.2
    • /
    • pp.65-72
    • /
    • 2002
  • Temperature is the most influential environment parameter which affects the quality change of agricultural products in cold storage. Therefore, it is essential to keep the uniform temperature distribution in the storage room. This study was performed to analyze the air movement and temperature distribution in the forced recirculating cold storage facility and to simulate optimum storage method of green groceries using 3-D CFD(three dimensional computational fluid dynamics) computer simulation which applied the standard $textsc{k}$-$\varepsilon$ turbulence model and FVM(finite volume method). The simulation was validated by the experimental results for onion storage and the simulation model was used to simulate the temperature and velocity distribution in the storage room with reference to the change of storage method such as location of storage, no stores, bulk storage, and pallet storage. In case of no stores, internal airflow was circulated without stagnation and consequently air movement and temperature distribution were uniform. In case of bulk storage, air movement was stagnated so much and temperature distribution of onion was not uniform. Furthermore, the inner temperature of onion roses more than the initial temperature of storage. In case of pallet storage, air movement and temperature distribution of onion were so uniform that the danger of quality change was decreased.

  • PDF

Signalling Network Management Using Object-Oriented Methods (객체 지향 기법의 신호망 관리 방식)

  • Kim, Tae-Hyeong;Go, Byeong-Do;Ryu, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.969-982
    • /
    • 1996
  • As the efficient management of the integrated network has been an important issue, the ITU-TS develops Telecommunication Management Network (TMN)and suggests standards to associate signalling network management with TMN. in this paper, we propose a method to manage signalling network, which is based on the standards. We suggest the TMN version SIGN(T_SIGNOS structure as a new Signalling Network OS(SIGNOS) structure and define the managed object classes in signalling network, and develop the Managed Information Base(MIB) to store the managed information of the object classes.

  • PDF

A New Approach to Spatial Pattern Clustering based on Longest Common Subsequence with application to a Grocery (공간적 패턴클러스터링을 위한 새로운 접근방법의 제안 : 슈퍼마켓고객의 동선분석)

  • Jung, In-Chul;Kwon, Young-S.
    • IE interfaces
    • /
    • v.24 no.4
    • /
    • pp.447-456
    • /
    • 2011
  • Identifying the major moving patterns of shoppers' movements in the selling floor has been a longstanding issue in the retailing industry. With the advent of RFID technology, it has been easier to collect the moving data for a individual shopper's movement. Most of the previous studies used the traditional clustering technique to identify the major moving pattern of customers. However, in using clustering technique, due to the spatial constraint (aisle layout or other physical obstructions in the store), standard clustering methods are not feasible for moving data like shopping path should be adjusted for the analysis in advance, which is time-consuming and causes data distortion. To alleviate this problems, we propose a new approach to spatial pattern clustering based on longest common subsequence (LCSS). Experimental results using the real data obtained from a grocery in Seoul show that the proposed method performs well in finding the hot spot and dead spot as well as in finding the major path patterns of customer movements.

A Study on Querying Method for RDF Data in XML Database (RDF 데이터 관리를 위한 효율적인 질의 처리에 관한 연구)

  • Hwang NamGoong;Kim Yong
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.3
    • /
    • pp.415-431
    • /
    • 2006
  • The semantic web was proposed as the next generation web technology. In the environment of the semantic web, resources as well defined and related with each other semantically, the RDF supports this basic mechanism. To establish and develop the semantic web. the basic technologies related to RDF data must be pre-established. In this research, we develop methods for storing and querying RDF data using an XML database system. As using XML database, XML data and RDF data can be integrated and efficiently managed. We construct and evaluate a system applying the proposed method to store and search data, we compared the query processing performance on our system with that of an existing system. The experiment result show that our system processes queries more efficiently.

  • PDF

A Study on Jukmiryu(粥穈類) in Junsaengpaljeon(遵生八牋) - with regard to Nonohangeon(老老恒言) (『준생팔전(遵生八牋)』의 '죽미류(粥穈類)'에 관한 연구(硏究) - 『노노항언(老老恒言)』과 관련하여 -)

  • Hong, Jin-Im;Yun, Chang-Yeol
    • Journal of Korean Medical classics
    • /
    • v.27 no.3
    • /
    • pp.67-86
    • /
    • 2014
  • Objectives : In this study, I want to work on efficacious porridges through inquiry into the Jukmiryu(粥穈類) based on the classical literature. It is intended to serve as a basic study to explore the modern-day application of dishes that are good as patient meals or healthy foods for elderly people. Methods : I have taken the original text of Jukmiryu(粥穈類) included in Junsaengpaljeon(遵生八牋) and translated it. Further, I have compared it to those porridges treated in Nonohangeon (老老恒言), a book in geriatrics from Ming Dynasty. Results : Nonohangeon(老老恒言) describes sources and effects of 100 porridges. With recipes too simplified, however, it doesn't provide any practical help. In contrast, Junsaengpaljeon(遵生八牋) presents 40 porridges together with their effects and recipes. It is practically more beneficial, as it provides recipes more specific than Nonohangeon(老老恒言). Conclusions : Jukmiryu(粥穈類) in Junsaengpaljeon(遵生八牋) set great store on the pharmacological effects of food. As it provides detailed description of porridge recipes and ingredients as well as their effects, readers can easily apply them to symptoms. Since individuals may choose what would be appropriate for their own symptoms, it could be helpful in not only providing patient meals and foods for elderly people but also improving dietary practice.

Research about Cipher Algorithm (암호 알고리즘에 관한 연구)

  • 이호현;박종민;조범준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.674-677
    • /
    • 2003
  • Modern society is information-oriented society that allow letters in electron, telecommunication, computer, highly Information-Communication and information processing by great development of semi-conductor technologies. All businesses are depending on computer. Also, Great many user according to development who is worth watching eagerly of computer network and utilization of database and technology could collect, search, handle, transmit and store data at the same time using computer. But, while processing and use of information that use computer become convenient, exposure of data became serious relatively. For these reason, Security problem of data that need the secret rose. Accordingly, new encryption methods to use computer for security of data are presented and are developed continuously. Studied about DES, 3DES, RSA, ECC algorithm to select cipher algorithm to use in research hereafter in this treatise.

  • PDF