• Title/Summary/Keyword: 비인간 행위성

Search Result 638, Processing Time 0.028 seconds

Simulation based Automatic Knowledge Acquisition (시뮬레이션을 통한 지식의 자동 획득)

  • 이강선;김명희
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1993.10a
    • /
    • pp.11-11
    • /
    • 1993
  • 도메인에 대한 전문 지식 획득(Acquisition of expert knowlegde)은 지식 제공자인 인간 전문가에 의존한다. 도메인이 복잡해 질수록 인간 전문가로부터 관련된 모든 지식을 획득하기란 어렵다. 이런 지식 획득의 어려움을 부분 흑은 완전 자동화된 지식 획득 시스템을 통해 해결하려는 많은 연구가 있어 왔다. 그러나 지식 획득을 위한 여러 시도들은 지식 제공자의 촛점이 도메인이 아닌 표현 구조나 도구- representation environment -에 보다 치우치게 하여, 잘못된 지식을 획득하게 하거나 주요지식이 생략되는 경우를 보이기도 한다. 또한 정적인 관계(relationship)에 의해서만 지식(Static Knowledge)을 생성하므로 시간흐름에 따라변화하는 지식을 나타내기는 어렵다. 본 연구에서는 시뮬레이션을 통한 자동 지식 획득(Simulation Based automatic Knowledge Acquisition) 방법을 제시한다. 이 방법은 1) 도메인에 관한 초기 인과관계 정보를 입력 받고, 2) 입력된 정보를 일정한 프레임에 따라 구조화 시켜 경험 베이스를 구성하고 이를 탐색하여 도메인과 관련된 확장된 정보를 얻은 후, 3) 위의1),2)를 통해 얻어진 정보를 분석하여 주어지는 입력에 대해 다양한 출력을 낼 수 있는 시뮬레이션 모델을 생성한다. 이 모델은 다음 단계의 지식 생성을 위한 수단(resource)이 되며, 구간값과 같은 불확실한 정보를 포함할 수 있는 구조이다. 마지막으로 4) 생성된 모델을 시뮬레이션하여 결과로 생성된 지식을 획득한다. 위의 과정에서, 지식획득을 위한 수단인 시뮬레이션 모델이 지식 제공자의 개입 없이 자동 생성됨에 따라, 지식 제공자는 도메인 관련 지식 그 자체에 집중할 수 있으며, 생성된 모델을 시뮬레이션한 결과에 의해 지식을 생성함으로써 동적인 지식이 얻어질 수 있다. DEVS 모델에 대한 타당성 검사 방법을 고찰하고 그 문제점에 대하여 자세히 설명한다. DEVS 모델의 타당성 검사에 이용하는 SPN 모델에 대한 개념과 DEVS 모델과 행위적으로 동등한 SNP 모델로 변환을 위한 관점을 제조명하다. 동일한 관점에서 두 모델의 상태표현이 같도록 DEVS 모델이 SPN 모델로 표현됨을 보이는 변환이론을 제시하고 변환이론을 바탕으로 모델 변환과정을 제시한다. 모델 변환이론과 변환고정을 기본으로 타당성 검사를 위한 새로운 동질함수(homogeneous function)를 정의하고 이와 함께 SPN 모델의 특성을 이용하여 DEVS 모델에 대한 타당성 검사 방법을 새롭게 제안한다. 에탄올투여로 증가된 유리기 해독계 효소인 GSH-Px활성을 큰 폭으로 감소시키고 에탄올투여로 감소된 비효소적 항산화작용을 나타내는 GSH함량을 다량 증가시킴으로서 지질과산화물에 대한 방어력이 증가되어 나타난 결과로 여겨지며, 또한 혈청중의 ALT, ALP 및 LDH활성을 유의성있게 감소시키므로서 감잎 phenolic compounds가 에탄올에 의한 간세포 손상에 대한 해독 및 보호작용이 있는 것으로 사료된다.반적으로 홍삼 제조시 내공의 발생은 제조공정에서 나타나는 경우가 많으며, 내백의 경우는 홍삼으로 가공되면서 발생하는 경우가 있고, 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$ elements)로 가정한다. 즉, [+wh] 의미의 겹의문사는 동일한 구성요 소를 지닌 병렬적 합성어([$[W1]_{XO-}$ $[W1]_{XO}$ ]$

  • PDF

Study on Telemedicine system in Medical Law (의료법상의 원격의료 제도에 관한 고찰)

  • Joung, Soon-Hyoung;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.241-249
    • /
    • 2012
  • The rapid development of the current information and communication brings big changes and progress in the health service delivery system. And it is becoming the worldwide trend increasingly. As the name of medical information, by more rapid, detail and more quickly to the patients and diagnosis of the disease it provides not only a high level of health care services but also hospitals and related institutions are making increase the efficiency of the work. Among them, the Telemedicine, that system has many advantage which can expect the shorten the waiting time and the uniform high level of medical, etc. without visiting medical institutions. Especially, the most advantage is it can increase the accessibility of information about extensive medical, without regard to the time and place. But this is the reality, which compared speed the development of modern science and technology with lack of operational regulations and mindset. Current in our Medical Law, it regulates the Telemedicine, but it has Institutional, facility, and environmental constraints. Because, there is no detailed legal relationship. And it takes that in terms of a special form called by a non-face-to-face contact with medical practice rather than the scene. Therefore, in this paper will find a way out to activate the Telemedicine by presupposes the development potential is infinite and find the legal issues and improvements.

The Relations between Ownership Structure and Cash Holdings of Firms (기업의 소유구조와 현금보유간의 관계)

  • Shin, Min-Shik;Kim, Soo-Eun
    • The Korean Journal of Financial Management
    • /
    • v.27 no.1
    • /
    • pp.89-120
    • /
    • 2010
  • In this paper, we analyse empirically the relations between ownership structure and cash holdings of firms listed on Korea Securities Market and Kosdaq Market of Korea Exchange. The main results of this study can be summarized as follows. Cash holdings increase as large shareholder's equity holdings increase. Cash holdings increase as the difference between first largest shareholder's and second largest shareholder's equity holdings increase, and cash holdings increase as the ownership concentration increase. Managerial ownership exert a non-linear effects on cash holdings. So to speak, at lower level of managerial ownership, managers hold more cash to pursue their own interests at the expense of minority shareholders, but at higher level of managerial ownership, the interests of managers and shareholders are aligned, and also at highest level of managerial ownership, managers hold more cash to pursue their own interests at the expense of minority shareholders. Cash holdings increase larger in owner-controlled firm than in management-controlled firm. These results support the expropriation of minority shareholders hypothesis that large shareholders can extract private benefits from corporate resources under their control at the expense of minority shareholders. This paper contributes to defining information value of large shareholder's equity holdings on cash holdings for a firms' other stakeholders such as investors and creditors, and to strengthening a legal and institutional safeguard for external minority shareholders. Ownership concentration might have negatively affected the evolution of the legal and institutional frameworks for corporate governance and the manner in which economic activity is conducted. It could be a formidable barrier to future policy reform.

  • PDF

A Study on the Main Issues Regarding Business Acts Related to Leisure Boats (레저선박 관련 사업법상 주요 쟁점사항에 관한 고찰)

  • Yoon, In-Joo;Hong, Jang-Won;Lee, Jung-A
    • Journal of Navigation and Port Research
    • /
    • v.41 no.6
    • /
    • pp.359-364
    • /
    • 2017
  • This study examined business acts related to leisure boats, so as to investigate the differences of regulations and things to be supplemented, as well as to suggest improvement measures. In order to achieve this purpose, the authors analyzed the respective legislations. The Acts on businesses using leisure boats(or power-driven water leisure crafts) are the Marine Transportation Act, Excursion Ship and Ferry Business Act, Water-Related Leisure Activities Safety Act, and Act on the Development, Management, etc. of Marinas. These Acts have differences in regulations, in terms of gross tonnage, the age of vessels, crewman, and the liquor traffic. These differences can cause problems such as adjusting the gross tonnage of the vessel by modifying the structures of the facilities, assigning old vessels, sailing without crewmen required for safety, and going against fairness in the liquor traffic in similar businesses. Such differences appeared to be caused by the lack of understanding of leisure boats and the series of new legislation which have been added one by one. It is required to raise the understanding on the characteristics of leisure boats and reflect them in the legislation.

Abstraction of Models with State Projections In Model Checking (모델 체킹에서 상태 투영을 이용한 모델의 추상화)

  • Kwon, Gi-Hwon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1295-1300
    • /
    • 2004
  • Although model checking has gained its popularity as one of the most effective approaches to the formal verification, it has to deal with the state explosion problem to be widely used in industry. In order to mitigate the problem, this paper proposes an ion technique to obtain a reduced model M' from a given original model M. Our technique Identifies the set of necessary variables for model checking and projects the state space onto them. The model M' is smaller in both size and behavior than the original model M, written M'$\leq$M. Since the result of reachability analysis with M' is preserved in M, we can do reachability analysis with model checking using M' instead of M. The abstraction technique is applied to Push Push games, and two model checkers - Cadence SMV and NuSMV - are used to solve the games. As a result, most of unsolved games with the usual model checking are solved with the ion technique. In addition, ion shows that there is much of time and space improvement. With Cadence SMV, there is 87% time improvement and 79% space one. And there is 83% time improvement and 56% space one with NuSMV.

Intelligent Broadcasting System and Services for Personalized Semantic Contents Consumption (개인화된 의미 기반 콘텐츠 소비를 위한 지능형 방송 시스템과 서비스)

  • Jin, Sung Ho;Cho, Jun Ho;Ro, Yong Man;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.422-435
    • /
    • 2005
  • Compared with analog broadcasting, digital broadcasting supports technical background to provide personalize the TV watching environment by offering broadcasting services that can adapt to viewers' preferences. However, current digital broadcasting shows limited services such as reservation recording, simple program guiding with an electronic program guide (EPG) on a personal video recorder system, and primitive data broadcasting by broadcasters. Therefore, the purpose of this paper is to suggest a new broadcasting environment which gives a person facility and a difference fur watching TV by serving enhanced personalized services. For that reason, we propose an intelligent broadcasting system which can minimize viewer's actions, and enhanced broadcasting services which are based on understanding of the semantics of broadcasting contents. To implement the system, agent technology as well as the MPEG-7 and TV-Anytime Forum (TVAF) are employed. For content-level services, real-time content filtering and personalized video skimming are designed and implemented. To verify the usefulness of the proposed system, we demonstrate it with a test-bed on which content-level personalized services are implemented.

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

Interdependence and Check in East Sea Rim: Focused on Border Trade n Transitional Nations (환동해권 지역사회의 상호의존과 견제: 제이행국가 접경지역의 대외경제교류 중심으로)

  • Choi, Youngjin
    • International Area Studies Review
    • /
    • v.16 no.3
    • /
    • pp.293-321
    • /
    • 2012
  • This study aims to examine how institutions has been formed to deepen interdependence and to keep check in trade on the border regions of East Sea Rim between the macro structure and micro behaviors. The transitional nations such as China, Russia, and North Korea adjacent to the East Sea Rim exhibits unique characteristics in terms of transaction governance structure. While the regional economy in northeast China is still overwhelmed by the stated-owned enterprises(SOEs), it strongly encourages the private economic trade to form institutional economy through the border trade port and peddler trade market. Thus trade is shaped by the mixed governance. In far east Russia, whereas the SOEs are in charge of exporting oil, gas etc., private firms and small scale traders are importing household items, so that it can also be called as the mixed governance, while informal social networks simultaneously work. In North Korea, for the trade, since the firms are mainly required to have the permits from the different levels of government, it is regarded as the hierarchical governance. The institutional economics seems to well explain the changing agencies and their influence on the trade among the regions in the East Sea Rim.

The Adequacy Analysis of Korean MVNO Policy (MVNO 정책의 타당성 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.926-929
    • /
    • 2014
  • In Korea MVNO was introduced in 2011 when twenty seven years had passed since Korea Mobile Telecom started mobile phone service in 1984. Whithout having its frequency bands and network facilities MVNO can resell the mobile telecom services to the consumers by purchasing MNO's service. That can bring competition more efffective that can lower communication costs through the alternatives. In the early 2000s, the need for the introduction of the MVNO has been raised already by scholars in Korea. But it wasn't until the late 2000s, rate cuts appeared to be a major policy issue, and in 2011 Korean government begin to try to introduce its own MVNO's. In may 2014, MVNO's mobile communication market share reached 6%, but Korea dose not have a firm system yet. However, if government authorities did not insist 3 mobile telecom companies system and recognize global MVNO flow quickly the national cost would be significantly reduced. In the mean time mobile telecom companies have maintained similar billing system and level of service but competed to attract consumers only. It looks like some level of mutual collision and the government cannot help recognizing the situation but it did not do any effective policy improvement effort and government only levied penalties.

  • PDF

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.