Korea's public assistance system, represented by NBLS(National Basic livelihood Security), has disclosed critical problems despite the rapid increase in its budget, such as decreasing work incentive and deepening welfare trap. These typical problems of classical welfare system have been commonly witnessed in many other advanced countries. Therefore a number of efforts have been exerted to correct these problems by transferring the existing welfare system into a welfare-to-work(or workfare) system, and the most common one of such efforts is introducing the EITC(Earned Income Tax Credit)-type programs. They have already been implemented in many countries such as the USA, the UK and France, also Korean government decided to launch EITC program in 2009. This paper aims to propose some measures to improve Korean EITC program. For this, an optimization problem is constructed from the government's viewpoint. Optimal EITC program is defined to be a solution to the problem - a combination of phase-in rate, phase-out rate, and maximum credit that maximizes labor supply increase under a exogenously given budget constraint. Using a mechanism design analysis, we derive and characterize the optimal EITC program. Analysis results implies that Korean EITC structure needs to be modified so that phase-in rate is larger than phase-out rate and the upper limit of phase-out range becomes larger. Comparative static analysis results show that the feature of the optimal EITC program is sensitive to the change of income distribution, suggesting that if beneficiaries are categorized into different income groups, then it is desirable to apply distinctive EITC programs to each group.
To achieve a computer tutor framework with high learning effects as well as practicality, the goal of this research has been set to developing an intelligent tutor for problem-solving in mathematics domain. The maine feature of the CyberTutor, a computer tutor developed in this research, is the facilitation of a learning environment interacting in accordance with the learners differing inferential capabilities and needs. The pedagogical information, the driving force of such an interactive learning, comprises of tutoring strategies used commonly in various domains such as phvsics and mathematics, in which the main contents of learning is the comprehension and the application of principles. These tutoring strategies are those of testing learners hypotheses test, providing hints, and generating explanations. We illustrate the feasibility and the behavior of our propose framework with a sample problem-solving learning in geometry. The proposed tutorial framework is an advancement from previous works in several aspects. Firstly, it is more practical since it supports handing of a wide range of problem types, including not only proof types but also finding-unkown tpes. Secondly, it is aimed at facilitating a personal tutor environment by adapting to learners of varying capabilities. Finally, learning effects are maximized by its tutorial dialogues which are derived from real-time problem-solving inference instead of from built-in procedures.
Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.
Kim, Myung-Chan;Heo, Cheol-Ho;Boo, Jin-Hyo;Cho,Yong-Ki;Han, Jeon-Geon
Proceedings of the Korean Vacuum Society Conference
/
1999.07a
/
pp.211-211
/
1999
Titanium nitride (TiN) thin films have useful properties including high hardness, good electrical conductivity, high melting point, and chemical inertness. The applications have included wear-resistant hard coatings on machine tools and bearings, decorative coating making use of the golden color, thermal control coatings for widows, and erosion resistant coatings for spacecraft plasma probes. For all these applications as feature sizes shrink and aspect ratios grow, the issue of good step coverage becomes increasingly important. It is therefore essential to manufacture conformal coatings of TiN. The growth of TiN thin films by chemical vapor deposition (CVD) is of great interest for achieving conformal deposition. The most widely used precursor for TiN is TiCl4 and NH3. However, chlorine impurity in the as-grown films and relatively high deposition temperature (>$600^{\circ}C$) are considered major drawbacks from actual device fabrication. To overcome these problems, recently, MOCVD processes including plasma assisted have been suggested. In this study, therefore, we have doposited Ti(C, N) thin films on Si(100) and D2 steel substrates in the temperature range of 150-30$0^{\circ}C$ using tetrakis diethylamido titanium (TDEAT) and titanium isopropoxide (TIP) by pulsed DC plamsa enhanced metal-organic chemical vapor deposition (PEMOCVD) method. Polycrystalline Ti(C, N) thin films were successfully grown on either D2 steel or Si(100) surfaces at temperature as low as 15$0^{\circ}C$. Compositions of the as-grown films were determined with XPS and RBS. From XPS analysis, thin films of Ti(C, N) with low oxygen concentration were obtained. RBS data were also confirmed the changes of stoichiometry and microhardness of our films. Radical formation and ionization behaviors in plasma are analyzed by optical emission spectroscopy (OES) at various pulsed bias and gases conditions. H2 and He+H2 gases are used as carrier gases to compare plasma parameter and the effect of N2 and NH3 gases as reactive gas is also evaluated in reduction of C content of the films. In this study, we fond that He and H2 mixture gas is very effective in enhancing ionization of radicals, especially N resulting is high hardness. The higher hardness of film is obtained to be ca. 1700 HK 0.01 but it depends on gas species and bias voltage. The proper process is evident for H and N2 gas atmosphere and bias voltage of 600V. However, NH3 gas highly reduces formation of CN radical, thereby decreasing C content of Ti(C, N) thin films in a great deal. Compared to PVD TiN films, the Ti(C, N) film grown by PEMOCVD has very good conformability; the step coverage exceeds 85% with an aspect ratio of more than 3.
This Study has two research interests: First, to give a new perspective in searching for the identifying features of social welfare studies in Korea where social welfare is recognized as an independent discipline through an examination of german research trends in social policy, where social policy is not recognized as an independent discipline, but as a field of study. The reasons of non-recognition of social policy studies as an independent discipline in Germany are value problems, vagueness of research objects, and the position of social welfare in relation to another social sciences. Second, to show the trends of german studies in social policy from diverse disciplines, i. e. sociology, political science, law, history, pedagogics etc. and the common points in these studies. The results of this study are as follows. First, the common feature of german Studies on the social policy from diverse disciplins is above all the interest in the improvement of Lebenslage, i. e. conditions of life. Second, the value problems in social sciences are not solved till now, but the interests in the improvement of Lebenslage don't mean studies of social policy must handle with values. The interests in the applicability of social policy don't mean values must be improved in the studies either. Third, the vagueness of the objects can be found also in other social sciences and is not unique in social policy studies. Fourth, the studies, which focuses on the improvement of Lebenslage and can contribute to construct theories such as raising the effectiveness of state intervention must be recognized as studies of social policy, even though they are written by social scientists from other disciplines. This means the theories of social policy to pursue are connected with theories of middle range, i. e. with lower degree of abstraction.
Journal of the Institute of Electronics Engineers of Korea TC
/
v.41
no.3
/
pp.187-187
/
2004
In this paper, we present an efficient architecture of a versatile Reed-Solomon (RS) decoder which can be programmed to decode RS codes continuously with my message length k as well as any block length n. This unique feature eliminates the need of inserting zeros for decoding shortened RS codes. Also, the values of the parameters n and k, hence the error-correcting capability t can be altered at every codeword block. The decoder permits 3-step pipelined processing based on the modified Euclid's algorithm (MEA). Since each step can be driven by a separate clock, the decoder can operate just as 2-step pipeline processing by employing the faster clock in step 2 and/or step 3. Also, the decoder can be used even in the case that the input clock is different from the output clock. Each step is designed to have a structure suitable for decoding RS codes with varying block length. A new architecture for the MEA is designed for variable values of the t. The operating length of the shift registers in the MEA block is shortened by one, and it can be varied according to the different values of the t. To maintain the throughput rate with less circuitry, the MEA block uses both the recursive technique and the over-clocking technique. The decoder can decodes codeword received not only in a burst mode, but also in a continuous mode. It can be used in a wide range of applications because of its versatility. The adaptive RS decoder over GF($2^8$) having the error-correcting capability of upto 10 has been designed in VHDL, and successfully synthesized in an FPGA chip.
Journal of the Institute of Electronics Engineers of Korea TC
/
v.41
no.3
/
pp.29-38
/
2004
In this paper, we present an efficient architecture of a versatile Reed-Solomon (RS) decoder which can be programmed to decode RS codes continuously with my message length k as well as any block length n. This unique feature eliminates the need of inserting zeros for decoding shortened RS codes. Also, the values of the parameters n and k, hence the error-correcting capability t can be altered at every codeword block. The decoder permits 3-step pipelined processing based on the modified Euclid's algorithm (MEA). Since each step can be driven by a separate clock, the decoder can operate just as 2-step pipeline processing by employing the faster clock in step 2 and/or step 3. Also, the decoder can be used even in the case that the input clock is different from the output clock. Each step is designed to have a structure suitable for decoding RS codes with varying block length. A new architecture for the MEA is designed for variable values of the t. The operating length of the shift registers in the MEA block is shortened by one, and it can be varied according to the different values of the t. To maintain the throughput rate with less circuitry, the MEA block uses both the recursive technique and the over-clocking technique. The decoder can decodes codeword received not only in a burst mode, but also in a continuous mode. It can be used in a wide range of applications because of its versatility. The adaptive RS decoder over GF(2$^{8}$ ) having the error-correcting capability of upto 10 has been designed in VHDL, and successfully synthesized in an FPGA chip.
On, Baeksan;Kim, Sunho;Moon, Woosik;Im, Sungbin;Seo, Iksu
Journal of the Institute of Electronics and Information Engineers
/
v.53
no.5
/
pp.55-65
/
2016
Detecting an object which is located at seabed is an important issue for various areas. This paper presents an approach to detection of an object that is placed at seabed in the shallow water. A conventional scheme is to employ a side-scan sonar to obtain images of a detection area and to use image processing schemes to recognize an object. Since this approach relies on high frequency signals to get clear images, its detection range becomes shorter and the processing time is getting longer. In this paper, we consider an active sonar system that is repeatedly sending a linear frequency modulated signal of 6~20 kHz in the shallow water of 100m depth. The proposed approach is to model consecutively received reflected signals and to measure their modeling error magnitudes which decide the existence of an object placed on seabed depending on relative magnitude with respect to threshold value. The feature of this approach is to only require an assumption that the seabed consists of an homogeneous sediment, and not to require a prior information on the specific properties of the sediment. We verify the proposed approach in terms of detection probability through computer simulation.
Purpose: The objective of the study: At present, the spectacles, with its use as a medical aids or a fashion trimming, are recognized as one of the living necessities which can't be separated from human body. One of the features of spectacles is that it must be worn on any part of human body. Such a feature has to be satisfied under the condition an user keeps feeling comfortable with the rim of spectacles worn. In order to ensure meeting this condition, a criterion has to be arranged for the design of the rim of spectacles. In order to manufacture a rim of spectacles which allows an user to secure a comfortable range of vision as well as enhancing the feeling when to be worn, a manufacturing standard has to be established based on optical science. No precise rim of spectacles could be made from the manufacturing method depending on the manufacturer's sensibility. When the rim of spectacles was manufactured according to the incorrect standards, it may cause an user such a fatal result as myopia, hyperopia or astigmatism. Methods: This study focuses on providing a detailed explanation about the design of rim, which is the most important element during designing a rim of spectacles, making use of the optical elements of spectacles, and helping the manufacturers and the people who work in the spectacles-related business understand and recognize what is correct and exact and then leading them to establish a standard in respect to the manufacture and selection of spectacles. Results, Conclusions: Considering the fact there happen many errors in relation with the names of rim stipulated in the provisions of International Standards Organization (ISO), due to wrong interpretation by some of the rim manufacturers, the right interpretation should be given about the bridge which is directly connected to rim, so that the rims of spectacles manufactured in Korea could keep a favorable position in competing with the foreign products of same kinds.
Journal of the Korean Institute of Intelligent Systems
/
v.20
no.1
/
pp.81-87
/
2010
The coverage ability is one of essential techniques for the Robotic Vacuum Cleaner (RVC). Most of the RVCs rely on random or regular pattern movement to cover a target space due to the technical difficulties to implement localization and map and constraints of hardwares such as controller and sensors. In this paper, we consider two main issues which are low computational load and using sensors with very limited sensing capabilities. First, in our approach, computing procedures to build map and detect the RVC's position are minimized by simplifying data obtained from sensors. To reduce computational load, it needs simply presenting an environment with objects of various shapes. Another isuue mentioned above is regarded as one of the most important problems in our approach, because we consider that many RVCs use low-cost sensor systems such as an infrared sensor or ultrasonic sensor with limited capabilities in limited range, detection uncertainty, measurement noise, etc. Methods presented in this paper are able to apply to general RVCs equipped with these sensors. By both simulation and real experiment, we evaluate our method and verify that the proposed method guarantees a complete coverage.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.