• Title/Summary/Keyword: Check-List

Search Result 394, Processing Time 0.029 seconds

EFFECT OF THE CURING TEMPERATURE OF DENTURE RESINS ON THE STRENGTH (의치용 수지의 온성온도가 강도에 미치는 영향)

  • Sunoo, Young-Gook
    • The Journal of the Korean dental association
    • /
    • v.16 no.3 s.106
    • /
    • pp.235-237
    • /
    • 1978
  • Dr. Walter Wright first presented the results of his studies on acrylic resins in July, 1937. The use of resins for adaptation in inlay and crown and bridge prosthesis was first reported in June 1940 by Harris. There has been now and acceptable list of several physical and mechanical properties of acrylic resins which have been studied to a considerable extent by various researchers, or determined from clinical experience. They include; pleasant esthetics, taste, odor, cleanliness, compatibility with oral tissue, dimensional stability, water sorption by imbibition, hardness, ease and success of repair, weight, thermal coefficient of expansion and strength to resist functional stress. The author carried a series of experiments forward to check the strength. Specimens which were cured at boiling temperature showed weaker strength than those ones which were cured at 72℃.

  • PDF

A Study on construction of extranet using wireless data communication of mobile device (모빌 디바이스의 무선데이터통신을 활용한 엑스트라넷 구축연구)

  • 유우식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.139-149
    • /
    • 1999
  • Developed in this paper is a prototype extranet using mobile device such as Personal Digital Assistance(PDA) or Handheld PC(HPC). Especially an adjustment transaction system for auto insurance using wireless data communications is described. Using infrastructures such as PCS, Cellular, Private Radio, wireless communications offers tremendous applications in Korea. A survey of such applications is presented in this paper. Also an analysis of currently available infrastructures of wireless communications is described in this paper. The scheme of an adjustment transaction consists of seven steps: (1) get list of adjustment, (2) obtain insurance information, (3) check police record, (4) get an accident record, (5) get bluebook value, (6) examine the car, (7) file report. Comparing with the previous on-line method that spends much time on gathering data, the proposed system guarantees more rapid transaction using wireless communications.

  • PDF

- A case study & suggestion for Lecture Evaluation System of University - (강의평가제에 관한 사례연구 -학생대상 설문조사에 근거한 교수 강의평가제 중심으로-)

  • 유지철;김용범;서장훈
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.2
    • /
    • pp.239-253
    • /
    • 2003
  • Lecture Evaluation system is an only way, so far, to evaluate the quality of lectures in our university and yet has several problems. This system does not have any effects on professors; however, it is rather used to threaten assistant professors and/or part-time/full-time lecturers. As a result, students are still dissatisfied with the unchanging lectures of professors. Generally speaking, We should consider new ideas to introduce a head teacher system or improve the lecture evaluation system to open doors wider for teachers, professors do their best to expand students' understanding by practicing the Lecture Evaluation System. In fact, it is hard to keep the objectiveness that the professors estimate the quality of professors. That is why this check list should be restricted only as a guideline among the system. After all, it is expected to bring better educational circumstances when the system functions properly to provide professors to research more.

Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

  • Seok, Ho-Jun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.61-69
    • /
    • 2016
  • In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.

A Case Study on Decision Making of Location for Army Repair Shop (군 정비창 입지선정 사례)

  • 이재권
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.50
    • /
    • pp.257-266
    • /
    • 1999
  • The objective of this study is to suggest DARE (Decision Alternative Ratio Evaluation) Method, which is usually using in VE(Value Engineering), as one of the evaluating alternatives techniques, especially deciding location. The process of solving location problem consists of 4 stages which are Data gathering and Confirming check list, Design of evaluating methodology, Evaluating, and Conclusion. In second stage which is the most important one among those, DARE method is adopted to solve location problem as a objective and scientific technique. The members who are participated workshop extremely agree to whole procedure of methodology and also their own conclusion through Workshop. This case study shows DARE method fits with select optimal location.

  • PDF

A Study on the Information System Security Audit Method for Personal Information Protection (개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구)

  • Lee, Dong-Nyuk;Park, Jeong-Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.107-116
    • /
    • 2010
  • To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.

A Study on Software Quality Evaluation in Analysis Phase (분석단계에서의 소프트웨어 품질 평가에 관한 연구)

  • 장영숙;권영식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.52
    • /
    • pp.261-273
    • /
    • 1999
  • It is booming to use computer and information owing to the information society. Therefore, software demand is increasing rapidly. Enhancing utility value depends upon software quality. Software quality measurement and evaluation are necessary to satisfy the users who are using computers. In the present time, ISO/IEC 9126 define 6 quality characteristics and 21 sub-characteristics including 40 inter quality characteristics. We developed software evaluation technique using the check list in accordance with the ISO/IEC 9126 in analysis phase. We evaluated the software quality in order to verify developing technique at S college. As a result of the evaluation, this college has found it necessary to maintain the software as soon as possible because academic systems are not adequate for users at this present time.

  • PDF

The Relationship Between Mother-Child Interaction Play Assessment of Children with Attention Deficit Hyperactivity Disorder and Delinquency-Oriented Behavior : Observational Study (주의력결핍 및 과잉행동장애 아동의 모-자녀 상호작용 놀이평가와 비행성향행동과의 관계 : 관찰연구)

  • Oh, Mi Kyoung
    • Korean Journal of Child Studies
    • /
    • v.25 no.3
    • /
    • pp.59-74
    • /
    • 2004
  • The purpose of the this study was to examine the relationship between mother-child interaction play assessment of children with Attention Deficit Hyperactivity Disorder(ADHD) and delinquency through observational method. The subjects were 30children(normal: 15, ADHD: 15) between 4-6 elementary school grade. Instruments used Parent-Child Interaction Assessment(P-CIPA), Inventory of Delinquency-Oriented Behavior and Korea Children Behavior Check List(K-CBCL). Results showed that following : 1) ADHD affect the delinquency-oriented behavior; 2) there were significant differences in mother-child interaction play assessment between normal children group and ADHD children group; and 3) there was a significant relationship between parent-child interaction play assessment and delinquency.

  • PDF

Korean Name of Cephalopods in Korea (우리나라에 출현하는 두족류 이름)

  • Kim, Yeong-Hye;Chun, Young-Yull
    • The Korean Journal of Malacology
    • /
    • v.26 no.2
    • /
    • pp.171-175
    • /
    • 2010
  • Korean cephalopods only recorded with Korean name in the literature were reviewed to solve confusions in use of their Korean name for taxonomic studies of cephalopods in Korea, and to prepare a basic check list for standardizing total cephaolopods fauna of Korea in the future. A total 38 cephalopods species with Korean names were listed in this study; 14 species in order Sepioidea, 17 species in Teuthoidea, 7 species in Octopoda. The etymology and some problems of Korean names of cephalopods occurring in Korea, and the useable rules for naming cephalopods with Korean words are recommended and discussed.

Recent Successive Cancellation Decoding Methods for Polar Codes

  • Choi, Soyeon;Lee, Youngjoo;Yoo, Hoyoung
    • Journal of Semiconductor Engineering
    • /
    • v.1 no.2
    • /
    • pp.74-80
    • /
    • 2020
  • Due to its superior error correcting performance with affordable hardware complexity, the Polar code becomes one of the most important error correction codes (ECCs) and now intensively examined to check its applicability in various fields. However, Successive Cancellation (SC) decoding that brings the advanced Successive Cancellation List (SCL) decoding suffers from the long latency due to the nature of serial processing limiting the practical implementation. To mitigate this problem, many decoding architectures, mainly divided into pruning and parallel decoding, are presented in previous manuscripts. In this paper, we compare the recent SC decoding architectures and analyze them using a tree structure.