• Title/Summary/Keyword: 의미제약

Search Result 551, Processing Time 0.027 seconds

Adaptive Clothing Designs for the Individuals with Special Needs (지체 장애인을 위한 개호복 디자인)

  • Na, Hyun-Shin
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.933-941
    • /
    • 2007
  • Nowadays the numbers of the disabled and elderly have been increasing, and the development of adaptive clothing for these people is in demand. The purpose of this study was to give ideas and solutions for the special needs clothing design. The knowledge of medical situation of the individuals with special needs has been examined and factors affecting adaptive clothing were suggested. Twenty-one web sites were investigated and the most practical, functional, fashionable adaptive clothes were suggested by items. Construction and location of openings, number and type of fastenings, and design of garments for comfort and ease of movement were carefully considered in these clothes. Better appearance through improvement of clothing will help these people to believe that they have worth in the sight of others and in their own view of themselves. Disabled and elderly can obtain the quality of life, maintain the dignity, and make the access to the world a little bit easier by solving the particular clothing problems with all these convenient as well fashionable adaptive clothing.

Analysis of Cryptography Technique on Application Layer based on WAP (WAP 기반의 Application Layer 암호화 기법 분석)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.748-751
    • /
    • 2004
  • In this paper, we discuss about wireless Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now. There are WAP(Wireless Application Protocol) and WPKI. WAP(now version 2.0) is a protocol specification for wireless communication networks. it provides an application framework and network protocols for wireless devices such as mobile telephones, PDAs and internet technologies. In this paper some analysis of security(e.g. digital signature or encryption) for wireless internet are performed.

  • PDF

Modeling and Verification of Workflows with Time Constraints (시간 제약을 포함한 워크플로우 모델링 및 검증)

  • Jeong, Hui-Taek;Lee, Do-Heon;Kim, Mun-Ja;Ryu, Yeong-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.261-274
    • /
    • 1999
  • Recently, automated business processing systems, so called workflow systems, have been studied. have been studied. even though each task has noticible duration inherently, most of previous models regard it as a simple finite automation where state transitions occur instantly. In this paper, we propose a modeling method for workflow each of whose component task has minimum processing time and due-date. Firstly we provide a priority function to choose the proper alternatives when tasks fail before their due-date. The priority function considers the time-relevant factor and the semantic compatibility level to decide the best alternative. secondly, we identify six different types of execution requirements for tasks with noticible durations. They are serial, parallel, simultaneous start simultaneous termination, interleaved and nested dependency. Note that previous models deal with only serial execution and parallel execution. Lastly, we also propose graph-based methods to detect logical conflicts in time constraint-based workflow specifications.

  • PDF

A Genetic Algorithm Application to Scalable Management of Multimedia Broadcast Traffic in ATM LANE Network (ATM LANE에서의 멀티미디어 방송형 트래픽의 Scalable한 관리를 위한 유전자 알고리즘 응용)

  • Kim, Do-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.725-732
    • /
    • 2002
  • Presented is a Genetic Algorithm (GA) for dynamic partitioning an ATM LANE(LAN Emulation) network. LANE proves to be one of the best solutions to provide guaranteed Quality of Service (QoS) for mid-size campus or enterprise networks with minor modification of legacy LAN facilities. However, there are few researches on the efficient LANE network operations to deal with scalability issues arising from broadcast traffic delivery. To cope with this scalability issue, proposed is a decision model named LANE Partitioning Problem (LPP) which aims at partitioning the entire LANE network into multiple Emulated LANs (ELANS), each of which works as an independent virtual LAN.

The Role of Participation in Arts and Cultural Activities in the Determinants of Happiness (행복결정요인에 대한 문화예술 활동참여의 역할)

  • Lee, Hakjun;Heo, Shik
    • Review of Culture and Economy
    • /
    • v.21 no.3
    • /
    • pp.3-30
    • /
    • 2018
  • The purpose of this study is to investigate the effects of participation in cultural activities on happiness. The empirical results show that participation in cultural activities has a positive impact on individual happiness, because cultural activities cause entertainment and social contacts with people. Furthermore, the levels of income and education are analyzed by dividing them into high and low groups. Noteworthy is that the low-income and less-educated groups show lower participation in cultural activities than those in the high-income and well-educated groups, But the utility magnitude gained through cultural activities is higher. This implies that opportunity costs arising from financial and time constraints are greater in the low-income and less-educated groups than in the high-income and well-educated groups. Finally, for the low-income group, the marginal utility is reduced when spending on cultural activities exceeds certain levels, which means there exist a budget constraint for the low-income group.

Heuristic Backtrack Search Algorithm for Energy-efficient Clustering in Wireless Sensor Networks (무선 센서 네트웍에서 에너지 효율적인 집단화를 위한 경험적 백트랙 탐색 알고리즘)

  • Sohn, Surg-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.219-227
    • /
    • 2008
  • As found in research on constraint satisfaction problems, the choice of variable ordering heuristics is crucial for effective solving of constraint optimization problems. For the special problems such as energy-efficient clustering in heterogeneous wireless sensor networks, in which cluster heads have an inclination to be near a base station, we propose a new approach based on the static preferences variable orderings and provide a pnode heuristic algorithm for a specific application. The pnode algorithm selects the next variable with the highest Preference. In our problem, the preference becomes higher when the cluster heads are closer to the optimal region, which can be obtained a Priori due to the characteristic of the problem. Since cluster heads are the most dominant sources of Power consumption in the cluster-based sensor networks, we seek to minimize energy consumption by minimizing the maximum energy dissipation at each cluster heads as well as sensor nodes. Simulation results indicate that the proposed approach is more efficient than other methods for solving constraint optimization problems with static preferences.

  • PDF

On the base inflectional forms of Korean old vernacular letters (언간에 나타나는 어기활용형에 대한 고찰)

  • Lee, Hyun-Ju
    • (The)Study of the Eastern Classic
    • /
    • no.56
    • /
    • pp.297-329
    • /
    • 2014
  • This paper aims to examine the base inflectional forms of Korean old vernacular letters, and explain why it appears with frequency. In the korean old vernacular letters, the suffix 'ha-' and ending of the 'Base+ha-' adjective derivation are not appear with extraordinary frequency. I called it the base inflectional forms. I consider it in function and morphological constructions and also the syntactic constructions. Whenever Joseon-era people wrote a letter with a time limit, they have need to diminish their exertion to use of the brush. Therefore the base inflectional forms appear with extraordinary frequency in comparison with other papers. In the 'X ha-' word formation of Korean old vernacular letters, 'ha-' is formal morpheme without substantial meaning. So 'X' is left and 'ha-' and ending can be omitted resolutely. The base inflectional forms are occurred to voluntary language performance for a particular intention. but it is not appear in all conditions. In some circumstances, it appear. I checked out the constructions on base inflectional forms. In the 'X ha-' word formation, 'X' is predicative base without fail. and the ending which take part in base inflectional forms has a grammatical function unadulteratedly.

A Role-Based Access Control Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 역할기반 접근제어모델)

  • Byun Chang-Woo;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.13-29
    • /
    • 2005
  • An important characteristic of role-based access control model(RBAC) is that by itself it is policy neutral. This means RBAC articulates security policy without embodying particular security policy. Because of this reason, there are several researches to configure RBAC to enforce traditional mandatory access control(MAC) policy and discretionary access control(DAC) policy. Specifically, to simulate MAC using RBAC several researches configure a few RBAC components(user, role, role-hierarchy, user-role assignment and session) for keeping no-read-up rule and no-write-down rule ensuring one-direction information flow from low security level to high security level. We show these researches does not ensure confidentiality. In addition, we show the fact that these researches overlook violation of integrity due to some constraints of keeping confidentiality. In this paper we propose a RBAC model satisfying both confidentiality and integrity. We reexamine a few RBAC components and constructs additional constraints.

Timing Agency in Digital Comics : Focused on Multimedia Comics (전자만화의 타이밍 에이전시 : 멀티미디어와 혼합된 만화를 중심으로)

  • Yoh, Mi-Ju
    • Cartoon and Animation Studies
    • /
    • s.27
    • /
    • pp.79-97
    • /
    • 2012
  • Comic book readers have respectively different reading speed and this means that time in comics is translated by readers' view. The authors arrange panels and gutters to control time, but time recognition in comics depends on the readers and generally it is the readers' role. On the contrary, the phenomenon having occurred by infinite canvas varied the authority of timing. Infinite canvas can give the comic book authors more authority of controlling timing than the readers by intervening in readers' relative time as an agents and transforming their fictive time into absolute time. Following to the concept of "Agency" in games, agency is the power which satisfies the players by reemergence of their intentions. Since some of digital comics absorbed the properties of other media such as animation and sound, we can see that the reader's timing agency is shifted to the author's timing agency. The purpose of this study is to analyse this phenomenon and to remind that agency motivated by the balance between material constraints and formal constraints becomes a condition of readability of digital comics but excessive timing constraints given to the readers causes a decrease of the readers' timing agency. This also can be a considerable matter when we produce digital comics.

An Empirical Study on Bank Capital Channel and Risk-Taking Channel for Monetary Policy (통화정책의 은행자본경로와 위험추구경로에 대한 실증분석)

  • Lee, Sang Jin
    • Economic Analysis
    • /
    • v.27 no.3
    • /
    • pp.1-32
    • /
    • 2021
  • This study empirically analyzes whether bank capital channel and risk-taking channel for monetary policy work for domestic banks in South Korea by analyzing the impact of the expansionary monetary policy on the rate spread between deposit and loan, capital ratio, and loan amount. For the empirical analysis, the Uhlig (2005)'s sign-restricted SVAR(Structural Vector Auto-Regression) model is used. The empirical results are as follows: the bank's interest rate margin increases, the capital ratio improves, risk-weighted asset ratio increases, and the amount of loans increases in response to expansionary monetary shock. This empirical results confirm that bank capital channel and risk-taking channel work in domestic banks, similar to the previous research results. The implications of this study are as follows. Although the expansionary monetary policy has the effect of improving the bank's financial soundness and profitability in the short term as bank capital channel works, it could negatively affect the soundness of banks by encouraging banks to pursue risk in the long run as risk-taking channel works. It is necessary to note that the capital ratio according to the BIS minimum capital requirement of individual banks may cause an illusion in supervising the soundness of the bank. So, the bank's aggressive lending expansion may lead to an inherent weakness in the event of a crisis. Since the financial authority may have an illusion about the bank's financial soundness if the low interest rate persists, the authority needs to be actively interested in stress tests and concentration risk management in the pillar 2 of the BIS capital accord. In addition, since system risk may increase, it is necessary to conduct regular stress tests or preemptive monitoring of assets concentration risk.