검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 9

        1.
        2022.10 구독 인증기관·개인회원 무료
        As part of the third ATM Challenge, we performed a series of atmospheric dispersion simulations for routine releases of Xe-133 from ordinarily operating nuclear facilities such as Medical Isotope Production Facilities (MIPFs), Nuclear Power Plants (NPPs), and Research Reactors (RRs) in the Northern Hemisphere using our ATM, Lagrangian Atmospheric Dose Assessment System (LADAS), with Numerical Weather Prediction (NWP) data produced by the Korea Meteorological Administration (KMA). The simulation time period is 6 months, from June to November in 2014, and we used the stack emission data except for CNL (Canada) and IRE (Belgium) in accordance with the scenario of the third ATM Challenge 2019. In addition, the simulations were done individually for all MIPFs, NPPs, and RRs. We utilized 3-hourly KMA’s Unified Model Global Data Assimilation and Prediction System (UM-GDAPS) data with 0.35°×0.23° horizontal resolution as input meteorological fields and extracted hourly time series results for Xe-133 activity concentrations with few different resolutions such as 0.5°×0.5°, 0.35°×0.23°, and 0.1°×0.1° at several IMS stations in the Northern Hemisphere which were in normal operation in 2014. Considering previously reported values of daily Xe-133 release amounts for CNL and IRE, measured signals at some IMS stations (such as CAX17, DEX33, SEX63, and USX75) were well reproduced from the simulation results.
        2.
        2005.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In general, cell transmission delay is more sensitive for real time video service rather than cell losses in a wireless ATM network. Existing handoff schemes, which are emphasizing the prevention of cell losses, have limitations in cell transmission delay
        4,000원
        3.
        2002.10 구독 인증기관 무료, 개인회원 유료
        In general, real-time video service is more sensitive to cell transmission delay than to cell loss. Existing handoff schemes emphasizing prevention of cell loss had limitations in cell transmission delay to satisfy QoS (Quality of Service). Thus, a scheme to minimize transmission delay generated during the handoff maintaining the sequence of cells is proposed. In this paper, transmission delay can be reduced by transmitting ATM cells with low CLP (CLP=0) prior to others and by discarding cells with high CLP (CLP=1). The proposed scheme is proven to be suitable for delay-sensitive real-time VBR service and appropriate for fast handoffs by giving high CLP (Cell Lose Priority) to less meaningful MPEG frames.
        4,000원
        4.
        2002.10 구독 인증기관 무료, 개인회원 유료
        A proper performance evaluation of ATM (Asynchronous Transfer Mode) multiplexer is essential for stable management of ATM networks. We model the on/off traffics entering to the ATM switch as a Markov renewal process (MRP) and propose a performance evaluation method of ATM multiplexer by modeling the system as a discrete time MR/D/1/B queueing system, whose input process is the superposed MRP and present a performance analysis by finding CLP(Cell Loss Probability).
        4,000원
        7.
        2019.02 KCI 등재 SCOPUS 서비스 종료(열람 제한)
        This research proposes a model of SERVQUAL scale calibration and uses the SERVPERF model to study the relationship between quality of ATM service and customer satisfaction. The research uses the combination of qualitative and quantitative methodology with the Cronbach’s alpha reliability analysis, Exploratory Factor Analysis (EFA) method; Confirmation Factor Analysis (CFA) and Structural Equation Modeling (SEM) through SPSS and AMOS 20.0 data analysis software. The survey was conducted with 800 questionnaires with the convenient sampling method. The number of remaining sample for analysis was 779 responses of individual customers using ATM card services of Bank for Foreign Trade of Vietnam (Vietcombank) Vinh Long. The results show that the satisfaction of customers using ATM cards of Vietcombank Vinh Long is influenced by 4 factors with the order of importance as follows: (1) Price; (2) Network; (3) Reliability; (4) Empathy. Thereby, the author suggests some managerial implications to Vietcombank Vinh Long management to enhance the ATM service quality, then improve customer satisfaction. This research still has some limitations: (1) The study does not investigate other influencing factors, (2) The convenient sampling method has not been generalized well, (3) The research is only conducted for Vietcombank.
        8.
        2008.06 KCI 등재 서비스 종료(열람 제한)
        The accused took a cash card from its owner and threatened to harm the latter if he would not divulge the password to him. He then withdrew money from an ATM several times over. The crime of the accused consists of the following three steps: 1) forcibly taking a cash card; 1) forcibly taking a cash card; 2) threatening to harm the owner of the cash card if he would not divulge the password to him; and 3) inserting the cash card in the ATM card slot and entering the password to withdraw the money in the account. If the crime of the accused that was described above were subdivided into the above three steps, the following conclusions would be established: (1) forcibly taking a cash card falls within the crime of robbery; (2) threatening to harm the holder of a cash card if he does not divulge the password to the accused falls within the crime of coercion; and (3) inserting the card in the ATM card slot and entering the password to withdraw cash from the account falls within the crime of theft. There is no objection that the act of forcibly extracting a password from the owner of the cash card in (2) is included in the act of forcibly taking the cash card, thus establishing the crime of robbery. However, whether the crime of theft in (3) can be considered distinct or separate from the crime of robbery in (1) is the core issue of this case. The Supreme Court adjudged that withdrawing cash from an ATM using someone else’s cash card that was forcibly taken from the latter consists of the crime of theft and can be considered separate or distinct from the crime of robbery because the accused threatened to harm the victim if he would not cooperate. As such, the resistance of the victim was repressed when his cash card was being forcibly taken from him. Therefore, the victim did not give his consent to the accused to withdraw money from his ATM account using his cash card. It is, however, thought of as inappropriate to completely separate such act of theft from the preceding act—the “improper acquisition of a cash card”—even though the succeeding act, withdrawing cash from an ATM, falls within the crime of theft. Considering the characteristics of a cash card, it can be said that the act of forcibly taking a cash card should be considered a means or method of withdrawing cash from an ATM.
        9.
        2003.08 KCI 등재 서비스 종료(열람 제한)
        Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.