• 제목/요약/키워드: NICE-3

검색결과 119건 처리시간 0.028초

LOCK을 확장한 3차원 단백질 구조비교 및 분석시스템의 설계 및 구현 (Comparison and Analyzing System for Protein Tertiary Structure Database expands LOCK)

  • 정광수;한욱;박성희;류근호
    • 정보처리학회논문지D
    • /
    • 제12D권2호
    • /
    • pp.247-258
    • /
    • 2005
  • 단백질의 구조는 단백질의 기능과 밀접한 연관을 가지고 있으며 단백질 구조비교는 단백질의 모티프와 패밀리를 결정하고 나아가서 그들의 기능을 파악하는데 매우 중요한 역할을 한다. 이 논문에서는 단백질 구조데이터 및 관련된 문헌 데이터의 통합된 데이터베이스를 구축하고 웹 환경에서 질의된 단백질과 유사성 비교를 진행하여 그 결과 및 연관된 문헌데이터를 검색하여 체계적으로 정보를 제공하는 단백질 분석시스템을 제안한다. 제안 시스템을 구축하기 위하여 현재까지 가장 큰 단백질 구조데이터의 저장소인 Protein Data Bank의 플랫파일 데이터에 대해 분석을 진행하고 여기에서 단백질의 구조비교 알고리즘에 필수적인 구조데이터정보를 추출하여 새로운 구조비교에 사용되는 엔트리 플랫 파일을 만들어서 데이터베이스를 구축한다 이러한 엔트리에 연관된 분석정보 데이터는 데이터베이스 스키마를 작성하여 문헌정보 데이터베이스를 구축한다. 따라서 사용자가 인터넷을 통하여 진행한 질의는 구조비교엔진을 통하여 유사부분과 RMSD값이 계산되고 이와 연관된 문헌정보의 검색이 진행된 후 체계적으로 출력화면에 보여준다. 제안 시스템은 기존의 구조비교시스템보다 빠른 검색을 지원하고 더 훌륭한 분석환경을 제공한다.

중년 여성의 니트 슬랙스 기본 원형 개발 (Development of Prototype of Knit Slacks for Middle-aged Women)

  • 이정진
    • 패션비즈니스
    • /
    • 제19권4호
    • /
    • pp.153-167
    • /
    • 2015
  • This paper proposes knit slacks patterns by lower body shape of middle-aged women. In addition, this paper aims to propose a design method for a prototype of nice knit slacks using the properties of knitwear. To select basic woven slack patterns which would be used in designing prototype of knit slacks for middle-aged women, two industrial slack patterns and two educational slack patterns were collected, and lab coats were prefabricated using muslin. Then, a shape test was performed by an evaluation board which consisted of eight experts who majored in Clothing Construction. Using blended yarn (1/17's) with 64% wool, 23% rayon and 13% nylon, 12G knit slacks in plain stitch were made. In terms of waist circumference of knit slacks, the front and the back were set to W/4+1+2(D) and W/4-1+2(D), respectively, with 1cm of difference using waist circumference (Omphalion) to cover the abdominal circumference. To make the front-back width of the side line even, the front waist circumference was increased by 1cm. The ease of hip circumference was set to 4cm in total with H/4+1+0.8 in front and H/4+1-0.8 in the back (0.8cm in difference). Crotch length was set by adding 3cm (width of waist belt) after deducting crotch height from waist height (Omphalion). The center front angle was shifted by 1cm while the center back angle was shifted from the center front to the side line by 5cm.

에로티시즘의 인지차원과 의복의 구성적인 특징 (The Cognitive Dimensions of A Eroticism and the Constructive Peculiarities of Clothing - Focused on Clothing of Versace -)

  • 이수인;정혜영
    • 한국의류학회지
    • /
    • 제28권9_10호
    • /
    • pp.1329-1340
    • /
    • 2004
  • The purpose of this study is to survey about the images of the sexy clothes that young women sympathize in modern society, that is, to make a research into the cognitive dimensions of 'Sexy image' and the constructive peculiarity of clothing. The researches into dimension of image by sexy clothing make that female mainly consist of in their twenties during May to October in 2003. The independent variables were: 1) The physical beauty dimension, 2) The negative estimate dimension, 3) The characteristic devaluation dimension,4) The elegance/ high grade dimension,5) The freshness/ beauty dimension,6) The sex appeal/ exposure dimension. Judging from each characteristic of costume in classified by articles, that is, colors, texture, shapes, details, and others-phenomenon of outerization of under clothing, print. We can know the clothes showing up our nice figures are the sleeveless design tied with strap, soft texture as silk chiffon and the colors that are not strong. And there were no embarrassed, ugly and pitiful clothing. Expressing sexy beauty by clothing is the result that the wearer produces intentionally by compounding design factors, it's the ideal when the observer's reaction and the wearer's intention correspond. Therefore, it will be helpful in expressing ideally if the subject, what kinds of sexy beauty the compounding design factors express, is studied carefully. Also it is expected to be used in grasping modem consumers' desires that want to look sexy, finding out how to express, dealing with the consumers' desires correctly, and the reference materials of the planning goods, sales promotion, and selecting of a medium of advertisement according to the consumers' desires.

통신 네트워크 운용을 위한 민감도 측정 시스템 개발 (A Development of Sensitivity Measurement for Relations in Communication Network Operation)

  • 권혁대
    • 한국콘텐츠학회논문지
    • /
    • 제3권4호
    • /
    • pp.63-68
    • /
    • 2003
  • 본 논문은 통신 네트워크 운용관련 민감도 측정에 관한 연구를 위해 네트워크 운용 적정비용 산출 및 효율화 방안을 제안하였다. 통신 네트워크 운용효율화를 위해 네트워크 운용 효율성 측정을 위한 모형을 개발하였다. 전반적/포괄적 관점에서 산출된 네트워크 운용의 적정비용에 대해 품질수준 개선을 위한 요소, 고객만족도 관련 요소 등과의 연계성을 중심으로 재평가하고 개선하는 것이 본 논문의 가장 핵심적인 연구이다. 이러한 과정은 네트워크 운용의 가장 큰 부분을 차지하는 것이 품질관련 활동이고 품질관련 활동은 결국 고객만족도로 나타나게 되는 것이기 때문에, 각 요소별 개별적인 변화가 상호간에 미치는 영향을 중심으로 상관관계를 정립하여 민감도 측정을 바탕으로 네트워크운용비용을 산출하는 것이 진정한 의미의 적정수준 분석이라 할 수 있다. 따라서, 본 논문에서는 네트워크 운용에 대한 체계적인 모형의 구축 및 효율성 측정을 위한 다양한 시나리오에 따른 민감도 측정을 위한 시스템을 개발하였다.

  • PDF

신제품 및 서비스에 있어 이분조각 Bass모형에 의한 확산 패턴 분석 (Analysis of Diffusion Pattern in New Product and Services Based on Two-pieces Bass Model)

  • 홍석기;홍정식
    • 산업공학
    • /
    • 제23권4호
    • /
    • pp.337-348
    • /
    • 2010
  • The Bass model is the most widely used model in research of new product diffusion because it presents a nice explanation on the diffusion process of new products. However, it has a limitation that its performance of fitness is lower as the available data become less and also, the diffusion curve is bell-shape and so, it can not represent the various diffusion patterns. Recently, a two-pieces Bass model is developed and applied to analyze diffusion of 10 products. The results are encouraging in terms of fitness. However, diffusion pattern is not dealt with in the paper. In this paper, analysis of diffusion pattern is in depth addressed in two-pieces Bass model. It is shown that the diffusion curves are divided into 3 types with respect to the peak adoption rate and each type is divided into 2 types further. Takeoff time of a diffusion process is analyzed by using the inflection point and regime-change time where it represents the point that imitation and innovation parameters change. Empirical studies for 68 products(28 domestic products and 40 USA products) are performed to analyze the diffusion pattern. Findings are that diffusion patterns of all products except 1 USA product show type I and regime-change time becomes shorter as the introduction time of the product is later in domestic products and regime-change time can be regarded as a takeoff time in 47% of total 68 products.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

ZMET을 활용한 방한 중국인 관광객의 꽃꽂이교육 관광콘텐츠 참여동기 연구 (ZMET-based Participation Motivation Analysis of Chinese Tourists's Floral Arrangement Courses Visit to Korea)

  • 최여여;김영재
    • 한국콘텐츠학회논문지
    • /
    • 제19권3호
    • /
    • pp.223-235
    • /
    • 2019
  • 본 연구는 ZMET을 이용하여 한국 꽃꽂이교육 관광콘텐츠 설계 및 마케팅 전략 도출을 위한 방한 중국인 관광객의 참여동기 파악에 목적을 두고 있다. 꽃꽂이교육 관광콘텐츠에 참여한 10명의 방한 중국인 관광객을 대상으로 한 조사 결과, '성취감을 얻는', '한국문화를 탐방하는', '선생님의 서비스가 좋은', '전문성이 강한', '함께 하는', '함께 교류하는', '함께라서 든든한', '중국에서 없는', '중국보다 좋은', '치유되는', '행복과 사랑을 느끼는', '예술적인 접근이 쉬운', '인생샷이 기록되는', '인테리어가 예쁜', '디자인이 특별한', '설레고 기대되는', '자연과 가까워지는', '일상을 예쁘게 장식하는' 18개의 참여동기 구성개념이 도출되었고 이를 연관시켜 도출된 공유개념도의 핵심 구성개념은 '성취감을 얻는', '한국문화를 탐방하는', '선생님의 서비스가 좋은', '전문성이 강한' 4개이다. 이를 바탕으로 향후 한국 꽃꽂이교육 관광콘텐츠의 설계 및 마케팅 전략에 있어 난이도 조절이 가능한 커리큘럼 개설, 방한 중국인이 선호하는 부가적 한국문화 체험 기회제공, 플로리스트의 다각도 자기개발 등이 필요하다는 것을 확인하였다.

CONSTRUCTION OF TWO- OR THREE-WEIGHT BINARY LINEAR CODES FROM VASIL'EV CODES

  • Hyun, Jong Yoon;Kim, Jaeseon
    • 대한수학회지
    • /
    • 제58권1호
    • /
    • pp.29-44
    • /
    • 2021
  • The set D of column vectors of a generator matrix of a linear code is called a defining set of the linear code. In this paper we consider the problem of constructing few-weight (mainly two- or three-weight) linear codes from defining sets. It can be easily seen that we obtain an one-weight code when we take a defining set to be the nonzero codewords of a linear code. Therefore we have to choose a defining set from a non-linear code to obtain two- or three-weight codes, and we face the problem that the constructed code contains many weights. To overcome this difficulty, we employ the linear codes of the following form: Let D be a subset of ��2n, and W (resp. V ) be a subspace of ��2 (resp. ��2n). We define the linear code ��D(W; V ) with defining set D and restricted to W, V by $${\mathcal{C}}_D(W;V )=\{(s+u{\cdot}x)_{x{\in}D^{\ast}}|s{\in}W,u{\in}V\}$$. We obtain two- or three-weight codes by taking D to be a Vasil'ev code of length n = 2m - 1(m ≥ 3) and a suitable choices of W. We do the same job for D being the complement of a Vasil'ev code. The constructed few-weight codes share some nice properties. Some of them are optimal in the sense that they attain either the Griesmer bound or the Grey-Rankin bound. Most of them are minimal codes which, in turn, have an application in secret sharing schemes. Finally we obtain an infinite family of minimal codes for which the sufficient condition of Ashikhmin and Barg does not hold.

근거기반 중심정맥 주입요법 간호실무지침 개정 (Updates of Evidence-Based Nursing Practice Guidelines for Central Venous Infusion Therapy)

  • 임경춘;정재심;김경숙;김현림;김현정;김동연;이미정;이주현
    • 임상간호연구
    • /
    • 제29권1호
    • /
    • pp.42-55
    • /
    • 2023
  • Purpose: This study was conducted to update nursing practice guidelines for intravenous infusion published in 2017. Methods: The guideline update process was carried out using 22 steps developed by NICE and SIGN. It was agreed to update domains related to central venous infusion therapy. Contents related to peripheral infusion would be updated later. Results: Updated guidelines for central venous infusion therapy consisted of 6 domains and 195 recommendations. The number of recommendations by domain was 11 for general instruction, 14 for central vascular access devices (CVAD) and add-on devices, 13 for nursing management before insertion of CVAD, 30 for management during insertion of CVAD, 51 for management after insertion of CVAD, and 76 for complications. A grade was 29 (14.9%), B grade was 87 (44.6%), and C grade was 79 (40.5%) in the strength of recommendations. A total of 37 (19.0%) recommendations were newly developed and 23 (12.3%) previous recommendations have been modified. The newly developed recommendations were mainly related to the infection control methods. Conclusion: The updated guideline is focused on safe maintenance of central venous infusion therapy. Through this guideline, it is hoped to minimize the occurrence of complications and improve the standardization and efficiency of nursing practice.

한국 제조기업의 기술혁신, 고용, 기업성과 간 관계에 대한 3SLS 분석: 고용의 양적·질적 특성 관점에서 (3SLS Analysis of Technology Innovation, Employment, and Corporate Performance of South Korean Manufacturing Firms: A Quantity and Quality of Employment Perspective)

  • 임동근;정진화
    • 기술혁신연구
    • /
    • 제31권3호
    • /
    • pp.139-169
    • /
    • 2023
  • 본 연구는 기업의 기술혁신이 고용과 기업성과에 미치는 영향을 변수 간 양방향 인과관계를 고려하여 분석하였다. 기술혁신의 대리변수는 기업의 특허출원 수이며, 분석대상은 100인 이상 규모의 국내 제조업체이다. 실증분석의 경우 기술혁신(특허출원), 고용(근로자 수, 숙련 근로자 비중), 기업성과(근로자 1인당 매출액)가 종속변수인 연립방정식 모형을 3단계 최소자승추정법(3SLS)으로 추정하였다. 외생변수로 기업의 경영상 특성과 일반적 특성을 통제하였고, 각 방정식의 식별변수로 R&D집약도, 근로자 1인당 노동비용(또는 기업부설연구소 보유 여부), 교육훈련투자를 사용하였다. 분석자료는 인적자본기업패널(HCCP)의 1차년도(2005년)~7차년도(2017년) 자료이며, 이를 NICE신용평가정보(주)의 기업 재무자료 및 한국 특허청의 특허정보와 병합하여 사용하였다. 분석결과에 의하면, 기업의 특허출원이 활발할수록 근로자 수, 숙련 근로자 비중, 근로자 1인당 매출액이 모두 증가하였고, 반대 방향의 인과관계도 모두 유의하였다. 따라서 기업의 기술혁신은 고용의 확대 및 질적 제고뿐 아니라 기업의 지속적인 성장에도 기여하는 것으로 확인된다.