• Title/Summary/Keyword: Duplicate

Search Result 566, Processing Time 0.026 seconds

대학도서관의 복본수 결정기법에 관한 연구

  • 양재한
    • Journal of Korean Library and Information Science Society
    • /
    • v.13
    • /
    • pp.131-166
    • /
    • 1986
  • This study is designed to review the methods of duplicate copies decision making in the academic library. In this thesis, I surveyed queueing & markov model, statistical model, and simulation model. The contents of the study can be summarized as follows: 1) Queueing and markov model is used for one of duplicate copies decision-making methods. This model was suggested by Leimkuler, Morse, and Chen, etc. Leimkuler proposed growth model, storage model, and availability model through using system analysis method. Queueing theory is a n.0, pplied to Leimkuler's availability model. Morse ad Chen a n.0, pplied queueing and markov model to their theory. They used queueing theory for measuring satisfaction level and Markov model for predicting user demand. 2) Another model of duplicate copies decision-making methods is statistical model. This model is suggested by Grant and Sohn, Jung Pyo. Grant suggested a model with a formula to satisfy the user demand more than 95%, Sohn, Jung Pyo suggested a model with two formulars: one for duplicate copies decision-making by using standard deviation and the other for duplicate copies predicting by using coefficient of variation. 3) Simulation model is used for one of duplicate copies decision-making methods. This model is suggested by Buckland and Arms. Buckland considered both loan period and duplicate copies simultaneously in his simulation model. Arms suggested computer-simulation model as one of duplicate copies decision-making methods. These methods can help improve the efficiency of collection development and solve some problems (space, staff, budget, etc, ) of Korean academic libraries today.

  • PDF

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.

대학도서관 자료처리 원가계산에 관한 연구

  • 이경호;심의순
    • Journal of Korean Library and Information Science Society
    • /
    • v.10
    • /
    • pp.157-191
    • /
    • 1983
  • The purpose of the study is to build a general cost a counting model for university libraries, to clarify the possible areas of its a n.0, pplication by employing job cost accounting and process cost accounting methods. System analysis is performed as to the fields of acquisition, processing (cataloging & classification), and book shelving system. The existing operation processes and time required for each operation of these three systems are analyzed, from which detailed system flowcharts were drawn and job descriptions and the content of job were identified. The results of the study can be summarized as follows: (1) The processing time of one book in each systems: Oriental books. a. Acquisition system. the time required the time required in case of job cost case of job cost accounting after purchasing, 8 min. 21 sec. the time required in case of process cost accounting 15 min. 7 sec. b. Processing system. the time required for non-duplicate, 34 min. 40 sec. the time required for duplicate, 8 min. 49 sec. the time required for purchasing of more than the time required two copies at a time. 4 min. 44 sec. c. Book shelving system. the time required. 1 min. 43 sec. Western books. a. Acquisition system the required in case of job cost accounting, 9 min. 1 sec. the time required in case of process cost accounting. 15 min. 7 sec. b. Processing system. the time required for non-duplicate, 32 min. 58 sec. the time required for duplicate, 9 min. 26 sec. the time required for purchasing of more than two copies at a time. 5 min. 33 sec. c. Book shelving system. the time required. 1 min. 43 sec. (2) Total sum of processing time and processing cost per book. Oriental books (including material cost) the time required. cost. a. non-duplicate, 51 min. 30 sec. 2, 791 won b. duplicate, 25 min. 39 sec. 1, 580 won c. purchasing of more than two copies as a time, 21 min. 34 sec. 1, 368 won Western books(including material cost) a. non-duplicate, 49 min. 48 sec. 3, 189 won b. duplicate, 26 min. 16 sec. 1, 846 won c. purchasing of more than two copies at a time. 22 min. 23 sec. 1, 388 won

  • PDF

A CASE OF DUPLICATE DENTURE FABRICATION (복제의치 제작예)

  • Kim, Chang-Whe
    • The Journal of the Korean dental association
    • /
    • v.16 no.2 s.105
    • /
    • pp.151-153
    • /
    • 1978
  • The author fabricated duplicate dentures by means of alginate-duplicated plaster dentures. The effect in duplicate dentures were the same as the original dentures in function as well as in shape, therefore, such technique was considered to be fully applicable in the clinic.

  • PDF

Vibration Analysis of the Shaft-duplicate Disk System (축-이중 원판계의 진동해석)

  • Chun, Sang-Bok;Lee, Chong-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.21 no.6
    • /
    • pp.896-906
    • /
    • 1997
  • The effect of duplicate flexible disks on the vibrational modes of a flexible rotor system is investigated by using an anlytical method based on the assumed modes method. The rotor model to be analyzed consists of duplicate disks on a flexible shaft. In modeling the system, centrifugal stiffening and disk flexibility effects are taken into account. To demonstrate the effectiveness of the method, a hard disk drive spindle system commonly used in personal computers and a simple flexible rotor system with two disks are selected as examples. In particular, the dynamic coupling between the vibrational modes of the shaft and the duplicate disks is investigated with the shaft rotational speed varied.

Infundibular Widening of Angiographically Invisible Duplicate Anterior Choroidal Artery Mimicking Typical Anterior Choroidal Artery Aneurysm

  • Jaechan, Park;Jong-Soo, Kim
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.1
    • /
    • pp.105-110
    • /
    • 2023
  • A diagnosis of an intracranial aneurysm depends on the angiographic configuration and should be cautiously differentiated from aneurysm mimics. In cases of duplicate anterior choroidal arteries (AChAs), infundibular widening of the distal minor AChA can be an aneurysm mimic. If the minor AChA with a smaller diameter is obscured angiographically due to poor contrast filling, an associated infundibular widening beside the proximal large AChA can misinterpreted as a typical AChA aneurysm in angiograms. The authors report on two such cases of duplicate AChAs with infundibular widening presenting like a typical AChA aneurysm in angiograms. Surgical exploration revealed a perforating artery emitting from the dome of the saccular lesion, confirming infundibular widening of a duplicate AChA. No reparative procedure was applied to the infundibular widening in a 48-year-old man, while two vascular outpouchings from the infundibular widening were clipped preserving the duplicate AChA in a 55-year-old woman.

The trends of duplicate publication in Korean Medical journals. (한의학 학술지에서의 이중게재 현황)

  • Ahn, Jin-hyang;Lee, Young-jin;Kwak, Jae-young;Kim, Min-hee;Choi, Inhwa
    • The Journal of Korean Medicine
    • /
    • v.38 no.3
    • /
    • pp.103-110
    • /
    • 2017
  • Objectives: The purpose of this study was to examine trends in duplicate publication in Korean medical articles indexed in the Oriental Medicine Advanced Searching Integrated System(OASIS). Methods: We searched the list of papers published in Korean medical journals by using OASIS. We randomly extracted 10% of total articles (n=1,162). We searched using OASIS by entering keywords from the title and names of the first and last authors of each indexed article. After the librarian selected the candidates of duplicate publication, three authors reviewed the full texts of the articles independently. When their opinions were not in agreement, reconciliation was made by discussion. The patterns of duplicate publication, such as copy, salami slicing (fragmentation), and aggregation (imalas), were also determined. Results: A total of 1162 articles were evaluated, 24 (2.1%) index articles of which were duplicate articles. Among 24 index articles, Two were triple publications and 22 were double publications. The patterns of duplication publication were as follows; (1) copy (n=8, 33.3%); (2) salami (9, 37.5%), (3) imalas (5, 20.8%) (4) others (2, 8.3%). Conclusion: Duplicate publications have appeared in Korean medical journals in a small proportion. Education on publication ethics and authors'ethical awareness is needed.

A Study on Duplication Verification of Public Library Catalog Data: Focusing on the Case of G Library in Busan (공공도서관 목록데이터의 중복검증에 관한 연구 - 부산 지역 G도서관 사례를 중심으로 -)

  • Min-geon Song;Soo-Sang Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.1-26
    • /
    • 2024
  • The purpose of this study is to derive an integration plan for bibliographic records by applying a duplicate verification algorithm to the item-based catalog in public libraries. To this, G Library, which was opened recently in Busan, was selected. After collecting OPAC data from G Library through web crawling, multipart monographs of Korean Literature (KDC 800) were selected and KERIS duplicate verification algorithm was applied. After two rounds of data correction based on the verification results, the duplicate verification rate increased by a total of 2.74% from 95.53% to 98.27%. Even after data correction, 24 books that were judged to be similar or inconsistent were identified as data from other published editions after receiving separate ISBN such as revised versions or hard copies. Through this, it was confirmed that the duplicate verification rate could be improved through catalog data correction work, and the possibility of using the KERIS duplicate verification algorithm as a tool to convert duplicate item-based records from public libraries into manifestation-based records was confirmed.

Concentric Circle-Based Image Signature for Near-Duplicate Detection in Large Databases

  • Cho, A-Young;Yang, Won-Keun;Oh, Weon-Geun;Jeong, Dong-Seok
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.871-880
    • /
    • 2010
  • Many applications dealing with image management need a technique for removing duplicate images or for grouping related (near-duplicate) images in a database. This paper proposes a concentric circle-based image signature which makes it possible to detect near-duplicates rapidly and accurately. An image is partitioned by radius and angle levels from the center of the image. Feature values are calculated using the average or variation between the partitioned sub-regions. The feature values distributed in sequence are formed into an image signature by hash generation. The hashing facilitates storage space reduction and fast matching. The performance was evaluated through discriminability and robustness tests. Using these tests, the particularity among the different images and the invariability among the modified images are verified, respectively. In addition, we also measured the discriminability and robustness by the distribution analysis of the hashed bits. The proposed method is robust to various modifications, as shown by its average detection rate of 98.99%. The experimental results showed that the proposed method is suitable for near-duplicate detection in large databases.

Frame-level Matching for Near Duplicate Videos Using Binary Frame Descriptor (이진 프레임 기술자를 이용한 유사중복 동영상 프레임 단위 정합)

  • Kim, Kyung-Rae;Lee, Jun-Tae;Jang, Won-Dong;Kim, Chang-Su
    • Journal of Broadcast Engineering
    • /
    • v.20 no.4
    • /
    • pp.641-644
    • /
    • 2015
  • In this paper, we propose a precise frame-level near-duplicate video matching algorithm. First, a binary frame descriptor for near-duplicate video matching is proposed. The binary frame descriptor divides a frame into patches and represent the relations between patches in bits. Seconds, we formulate a cost function for the matching, composed of matching costs and compensatory costs. Then, we roughly determine initial matchings and refine the matchings iteratively to minimize the cost function. Experimental results demonstrate that the proposed algorithm provides efficient performance for frame-level near duplicate video matching.