• Title/Summary/Keyword: 내용증명

Search Result 263, Processing Time 0.023 seconds

How to Pose an Open Problem? : Two Cases of Posing an Open-ended Problem by Reorganizing Given Closed Problems (개방형 문제를 어떻게 만들 것인가?: 두 개의 개방형 문제 제작 사례를 중심으로)

  • Do, Jong-Hoon
    • Journal of the Korean School Mathematics Society
    • /
    • v.10 no.2
    • /
    • pp.221-235
    • /
    • 2007
  • Open problems can provide experiences for students to yield originative and various products in their level, because it is open with respect to its departure situation, goal situation, or solving method. Teachers need to pose and utilize open problems in forms of solution-finding or proving problems. For this we first have to specify which resource and method to use by concrete examples. In this article, we exemplify a method and procedure of posing an open problem by the two cases in which we pose open problems by reorganizing given closed problems. And we analyze students' responses for the two posed open problems. On the basis of these, we reflect implications for mathematical education of open problems.

  • PDF

Investigation of elementary teachers' perspectives on science inquiry teaching (과학 탐구 지도에 대한 초등학교 교사들의 인식 조사)

  • Jeon, Kyungmoon
    • Journal of Science Education
    • /
    • v.39 no.2
    • /
    • pp.267-277
    • /
    • 2015
  • This study explored elementary school teachers' perspectives on science inquiry teaching. First, an open-ended questionnaire was administered to elicit teachers' experiences of their approach to inquiry teaching. These self-reported approaches revealed three conceptions of teaching for inquiry learning in science: 'science process skills-centered' category focused on observing, classifying, measuring, and fair testing; 'generating scientific questions' category focused on students' question-generating; and 'illustrate concept and/or content' category focused on science content demonstration by making use of experimental procedures to obtain expected results. Second, teachers were asked to place 18 activity cards either close to or further from an 'inquiry-based science classroom' card. The relative distances from the activity card to the central classroom card were measured. The teachers perceived that students' activity of 'designing and implementing appropriate procedures' was the most important in supporting an inquiry-based science classroom. Understanding teachers' views has implications for both the enactment of inquiry teaching in the classroom as well as the uptake of new teaching behaviors during professional development.

  • PDF

A Study on the Navigational Competence of Junior Naval Officers (해군 초급장교의 해기능력에 관한 연구)

  • Choi, Chang-Mook;Lim, Bong-Taek;Ko, Kwang-Soob
    • Journal of Navigation and Port Research
    • /
    • v.36 no.10
    • /
    • pp.819-824
    • /
    • 2012
  • In this paper, mandatory minimum requirements for certification of officers in charge of a navigational watch on ship by international convention on STCW (standards of training certification and watchkeeping for seafarers) were investigated. The training education and evaluation systems for navigational competence of Korean navy were compared and analyzed. As a result, we have confirmed that junior naval officers from Korean midshipmen had the navigational competence based on the STCW convention by analyzing the courses of Korea naval academy, midshipmen life, training exercise systems, and so on. OCS and NROTC provided a curriculum that did not quite meet the standard of the STCW convention. However, it was sufficient for nurturing basic abilities for navigation safety.

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network (무선 센서 네트워크에서의 메모리 공간 삭제를 이용한 선행 코드-검증 기법)

  • Choi, Young-Geun;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.37-46
    • /
    • 2007
  • The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

The Negative Effect of the Advertising Endorser's Smile and Consumer's Self-construal Level on Purchase Intention of the Brand in the Expensive Product Category (광고모델의 미소와 소비자의 자기해석 수준이 고가 제품군 브랜드의 구매의도에 미치는 부정적 효과)

  • Kim, Taemin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.678-686
    • /
    • 2021
  • A smiling face usually has a positive effect on interpersonal relationships by delivering a warm impression. However, the stereotype content model and compensation effect between warmth and competence suggested that warmth perceptions caused by a smiling face could influence competence perceptions negatively. This study examined the negative impact of the advertising endorser's smile on purchase intention in an expensive product category by adopting the self-construal level. The study results showed that consumers with independent-self construal (vs. interdependent self-construal) showed a lower purchase intention when exposed to an ad containing an endorser's smile. In comparison, consumers with interdependent-self construal (vs. independent self-construal) showed a lower purchase intention when exposed to an ad without an endorser's smile. Thus, this study demonstrated a moderating role of self-construal in the relationship between advertising endorser's smile and purchase intention. These findings provide valuable theoretical and practical implications for effective advertising strategies in the expensive product category.

Poem in Ca Trù: Type, Structure, Content (베트남의 음악시, 까쭈: 형식, 구조, 내용)

  • Nguyen, Duc Mau
    • SUVANNABHUMI
    • /
    • v.2 no.1
    • /
    • pp.95-110
    • /
    • 2010
  • Poem plays an important role in Ca trù. Many music researchers say that singing Ca trù is singing poem. Of 46 tunes of Ca trù, there are more than 10 tunes expressed in available poems or styles of poetry; for example: in the tune Tỳ bà, the performer could sing Tỳ bà hành by Bạch Cư Dị being converted into seven-seven-six-eight-word-meter; in the reciting poem tunes, just reciting 5 Thien thai poems by Tào Đường or 3 Thanh Bình tune poems by Lý Bạch; in the reciting poetic essay (phú), reciting Tien Xich Bich and Hau Xich Bich by Tô Đông Pha. Others like bắc phản, cung bắc sometimes used six-eight word meters. Structurally, those are available for familiar types and beyond the scope of particular creativity because they do not originate from Ca trù's activity environment like recitative. Recitative is the main tune of Ca trù and has become an independent poem type. In terms of literature, recitative has a particular form structure and special type content. Unlike other tunes of Ca trù that only stop at some fixed works, recitative has increased to thousands of works in quantity and has been composed for many centuries. For those reasons, we confined ourselves the research to the creation which is the most typical of Ca tru: The recitative.

  • PDF

Edge Feature Extract CBIRS for Car Retrieval : CBIRS/EFI (차량 검색을 위한 측면 에지 특징 추출 내용기반 검색 : CBIRS/EFI)

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.75-82
    • /
    • 2010
  • The paper proposed CBIRS/EFI with contents based search technique using edge feature information of the object from image information of the object which is uncertain. In order to search specially efficiently case of partial image information of the object, we used the search technique which extracts outline information and color information in feature information of object. In order to experiment this, we extracted side edge feature information of the vehicle for feature information of the object after capture the car image of the underground garage. This is the system which applies a contents base search by the result which analyzes the image which extracts a feature, an original image to search and a last similar measurement result. This system compared in FE-CBIRS systems which are an existing feature extraction contents base image retrieval system and the function which improves the accuracy and an effectiveness of search rate was complemented. The performance appraisal of CBIRS/EFI systems applied edge extraction feature information and color information of the cars. And we compared a color feature search time, a shape characteristic search time and a search rate from the process which searches area feature information. We extracted the case 91.84% of car edge feature extraction rate. And a average search time of CBIRS/EFI is showing a difference of average 0.4-0.9 seconds than FE-CBIRS from vehicle. color search time, shape characteristic search time and similar search time. So, it was proven with the fact that is excellent.

Effective Prioritized HRW Mapping in Heterogeneous Web Server Cluster (이질적 웹 서버 클러스터 환경에서 효율적인 우선순위 가중치 맵핑)

  • 김진영;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.708-713
    • /
    • 2003
  • For many years clustered heterogeneous web server architecture has been formed on the internet because the explosive internet services and the various quality of requests. The critical point in cluster environment is the mapping schemes of request to server. and recently this is the main issue of internet architecture. The topic of previous mapping methods is to assign equal loads to servers in cluster using the number of requests. But recent growth of various services makes it hard to depend on simple load balancing to satisfy appropriate latency. So mapping based on requested content to decrease response time and to increase cache hit rates on entire servers - so called “content-based” mapping is highly valuated on the internet recently. This paper proposes Prioritized Highest Random Weight mapping(PHRW mapping) that improves content-based mapping to properly fit in the heterogeneous environment. This mapping scheme that assigns requests to the servers with priority, is very effective on heterogeneous web server cluster, especially effective on decreasing latency of reactive data service which has limit on latency. This paper have proved through algorithm and simulation that proposed PHRW mapping show higher-performance by decrease in latency.

On the data of Euclid (유클리드의 자료론(Euclid's Data)에 대하여)

  • Yoon, Dae-Won;Suh, Bo-Euk;Kim, Dong-Keun
    • Journal for History of Mathematics
    • /
    • v.21 no.2
    • /
    • pp.55-70
    • /
    • 2008
  • This study is about the Data which is one of Euclid's writing. It dealt with the organization of contents, formal system and mathematical meaning. First, we investigated the organization of contents of the Data. Second, on the basis of this investigation, we analyzed the formal system of the Data. It contains the analysis of described method of definition, proposition, proof and the meaning of 'given'. Third, we explored the mathematical meaning of the Data which can be classified as algebraic point of view, geometric point of view and the opposite point of view to 'The Elements'.

  • PDF