• Title/Summary/Keyword: Strong Instances

Search Result 18, Processing Time 0.021 seconds

Analysis for the difficulty of the vector decomposition problem (벡터 분해 문제의 어려움에 대한 분석)

  • Kwon, Sae-Ran;Lee, Hyang-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.27-33
    • /
    • 2007
  • Recently, a new hard problem on a two dimensional vector space called vector decomposition problem (VDP) was proposed by M. Yoshida et al. and proved that it is at least as hard as the computational Diffe-Hellman problem (CDHP) on a one dimensional subspace under certain conditions. However, in this paper we present the VDP relative to a specific basis can be solved in polynomial time although the conditions proposed by M. Yoshida on the vector space are satisfied. We also suggest strong instances based on a certain type basis which make the VDP difficult for any random vector relative to the basis. Therefore, we need to choose the basis carefully so that the VDP can serve as the underlying intractable problem in the cryptographic protocols.

A Proposal for Enhancing Dispute Resolution Functions and the Governance of Korea National Contact Point (NCP) to the OECD Guidelines for Multinational Enterprises (OECD 다국적기업 가이드라인 한국 국내연락사무소 (NCP)의 분쟁해결 기능과 지배구조 개선방안)

  • Ahn, Keon-Hyung
    • Journal of Arbitration Studies
    • /
    • v.27 no.4
    • /
    • pp.179-198
    • /
    • 2017
  • The OECD Guidelines for Multinational Enterprises (The Guidelines) was initially promulgated in 1976 as a form of annex to the OECD Declaration on International Investment and Multinational Enterprises. The Guidelines aims at accomplishing the implementation and dissemination of the Responsible Business Conduct. The latest version of The Guidelines, as revised in 2011, directed 47 adhering countries to The Guidelines to set up their respective National Contact Points (NCPs). NCPs are The Guidelines' dispute resolution mechanism for specific instances arising from breach by multinational enterprises of The Guidelines. Korea to date has its own NCP performing its role to offer good offices and facilitates settlement between the parties to the specific instances regarding The Guidelines. However, there has been strong criticism from NGOs and civil society that Korea NCP has not performed well due to lack of transparency and impartiality, especially in the context of the governance of Korea NCP. Under this circumstance, this paper ⅰ) examines current status and problems of Korea NCP, ⅱ) evaluates the core criteria for function and governance of NCPs through a comparative overseas cases study, and ⅲ) suggests improvement plans for Korea NCP.

Expression of the Multidrug Resistance Gene and its Product in Osteosarcomas of the Bone - Immunohistochemistry and In Situ Hybridization -

  • Park, Hye-Rim;Park, Yong-Koo
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.3 no.1
    • /
    • pp.9-17
    • /
    • 1997
  • Resistance to combination chemotherapy remains challenge in the treatment of osteosarcoma. One of the mechanisms of multiple drug resistance is an increased expression of the multidrug resistance gene(mdr1). Expression of the P-glycoprotein(mdr-1 gene product) was studied immunohistochemically and the mdr-1 gene by in situ hybridization in 33 osteosarcomas relating to various prognostic factors. Thirty cases out of 33 osteosarcomas(90.9%) showed positive cytoplasmic reactions with P-glycoprotein and nineteen instances(57.6%) were strong positive(2+). The older(>20 years) and female patients revealed more intense immunohistochemical reactions rather than those of the younger and male patients. Osteoblastic and chondroblastic osteosarcomas revealed more strong immunohistochemical reactions compared to fibroblastic types. There were no significant staining differences between the type of bony involvement, Broder's grade and the presence of necrosis. On follow-up, the mean survival rate was decreased in the strong positive group, however, this was not statistically significant. In situ hybridization for mdr-1 gene revealed positive signals in 22 cases out of 29 osteosarcomas(75.9%). Chemotherapy was done in 15 cases out of 28 patients(53.6%). The results of immunohistochemistry and in situ hybridization were not correlated with the protocols for chemotherapy. However, this result should be confirmed by a larger scale study about mdr1 mRNA expression.

  • PDF

Separation Heuristic for the Rank-1 Chvatal-Gomory Inequalities for the Binary Knapsack Problem (이진배낭문제의 크바탈-고모리 부등식 분리문제에 대한 발견적 기법)

  • Lee, Kyung-Sik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.38 no.2
    • /
    • pp.74-79
    • /
    • 2012
  • An efficient separation heuristic for the rank-1 Chvatal-Gomory cuts for the binary knapsack problem is proposed. The proposed heuristic is based on the decomposition property of the separation problem for the fixedcharge 0-1 knapsack problem characterized by Park and Lee [14]. Computational tests on the benchmark instances of the generalized assignment problem show that the proposed heuristic procedure can generate strong rank-1 C-G cuts more efficiently than the exact rank-1 C-G cut separation and the exact knapsack facet generation.

Computational Study of Cutting Planes for a Lot-Sizing Problem in Branch-and-Cut Algorithm (Branch-and-Cut 알고리즘에서 Lot-Sizing 문제에 대한 Cutting Planes의 전산 성능 연구)

  • Chung, Kwanghun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.3
    • /
    • pp.23-38
    • /
    • 2015
  • In this paper, we evaluate the strength of three families of cutting planes for a lot-sizing problem. Lot-sizing problem is very basic MIP model for production planning and many strong valid inequalities have been developed for a variety of relaxations in the literature. To use three families of cutting planes in Branch-and-Cut framework, we develop separation algorithms for each cut and implement them in CPLEX. Then, we perform computational study to compare the effectiveness of three cuts for randomly generated instances of the lot-sizing problem.

Linguistic Phonetics and Korean Language Teaching - A Phonetic Approach to Teaching Standard Pronunciation - (한국어 교육 향상을 위한 언어학적 기초 연구)

  • Lee Hyun Bok
    • MALSORI
    • /
    • no.19_20
    • /
    • pp.43-57
    • /
    • 1990
  • The teaching of pronunciation is one of the areas in which linguistic phonetics can play an extremely useful role. This paper is concerned with the application of the results of my phonetic research to the actual teaching of Korean standard pronunciation with special reference to speech rhythm. It has been found that Korean words and utterances of various lengths are pronounced in standard Korean with one of the four main rhythmic patterns, each containing a strong stress. Unless we get the rhythmic patterns right in pronouncing Korean words and utterances, therefore, the resulting pronounciation is bound to sound dialectal or incorrect and in many instances even unintelligible to listeners. Hence the undeniable need to devise a useful technique to teach the Korean speech rhythm in a systematic way. In this paper each of the four main rhythmic patterns is presented and elaborated with sample examples taken from the living Korean. It is hoped that these examples of words and utterances can be used at the same time as useful pronunciation drill material not only for Koreans with dialectal background but also for foreign learners of Korean.

  • PDF

A Study of Public Library Patrons' Understanding of Library Records and Data Privacy

  • Kim, Dong-Seok;Noh, Younghee
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.1
    • /
    • pp.53-78
    • /
    • 2014
  • As instances of private information leak increase, taking steps to protect such information becomes a necessity. In this study of public library patrons, we strove for a comprehensive understanding of library usage records to suggest viable solutions for private information safety in public libraries. To this end, we investigated the patrons' understanding of library usage records and determined the relationship between different user characteristics and privacy knowledge or leaks. The results show that a high number of patrons perceived these records as their own private information, but that there was no necessity for legal procedures or consent for the use of these records. Also, even though the understanding of these usage records showed that there was a relationship between the frequency of library visits and leaks of personal information, the correlation was not particularly strong.

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

Adaptive Security Management Model based on Fuzzy Algorithm and MAUT in the Heterogeneous Networks (이 기종 네트워크에서 퍼지 알고리즘과 MAUT에 기반을 둔 적응적 보안 관리 모델)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.104-115
    • /
    • 2010
  • Development of the system which provides services using diverse sensors is expanding due to the widespread use of ubiquitous technology, and the research on the security technologies gaining attention to solve the vulnerability of ubiquitous environment's security. However, there are many instances in which flexible security services should be considered instead of strong only security function depending on the context. This paper used Fuzzy algorithm and MAUT to be aware of the diverse contexts and to propose context-aware security service which provides flexible security function according to the context.

On English Non-DP Subjects and their Structural Position (영어 non-DP 주어의 구조적 위치)

  • 홍성심
    • Language and Information
    • /
    • v.6 no.2
    • /
    • pp.1-14
    • /
    • 2002
  • This paper discusses so called the non-DP subject constructions in English. In general, a subject is a DP that bears Nominative case and that occupies 〔Spec, IP〕. However, in some examples under investigation, it looks as if non-DP categories such as Prepositional Phrases(PP), Adjectival Phrases(AP), Adverbial Phrases (AdvP), Small Clauses (PreP or SC), and VP occupy the canonical subject position, 〔Spec, IP〕. Under the framework of Chomsky's (1993, 1995) along with his previous works (Chomsky 1981, 1986), the Case Checking mechanism undoubtedly assumes that only DPs can have Case Therefore, the Case Checking/Agree mechanism is stated such that the strong uninterpretable feature, in this case Case feature (D or NP) feature must be checked off in a certain manner. Therefore, any phrasal categories other than DPs are not included in the considerations. Nonetheless, there are many instances of non-DP categories in English that occupy the seemingly canonical subject position, 〔spec, IP〕. In this paper, it is proposed that the actual position of these non-DP subjects in English is not in Spec of IP. Rather, they occupy 〔Spec, TopP〕 under CP in the sense of Lasnik & Stowell (1991), Rizzi (1997), and Haegeman & Gueron (1999). In its effect, therefore, this paper extends the idea of Stowell (1981) who argues that the clausal subjects in English is not in 〔Spec, IP〕, but in 〔Spec, TopP〕. We further argue that Stowell's version of Case Resistance Principle must be extended in order to accomodate many more occurrences of so called non-DP subjects.

  • PDF