• 제목/요약/키워드: primary information

검색결과 3,575건 처리시간 0.031초

시민의 개인적 특성과 범죄두려움 관계 분석 (Analysis on the Relations of Citizen's Personal Character and Fear of Crime)

  • 성용은;유영재
    • 시큐리티연구
    • /
    • 제14호
    • /
    • pp.261-283
    • /
    • 2007
  • 범죄두려움의 원인을 설명하기 위한 최근의 연구들에서는 성, 연령, 경제수준, 범죄 피해경험 등의 미시적인 개인수준과 거시적인 지역수준과의 연계를 시도하는 연구에 관심과 노력을 보이고 있다. 하지만 이 연구에서는 이러한 지역수준의 특성에 대한 개인의 관심과 해석은 개인의 특성으로서 과거의 범죄피해경험, 범죄피해의 취약성 정도, 범죄관련 정보에 대한 관심에 따라 다를 수 있다고 보며, 미시적인 수준과 거시적인 수준의 연계를 시도하기에 앞서 개인적인 수준에서 개인의 특성과 범죄두려움의 관계에 대해서 실증적인 분석을 실시하였다. 따라서 이 연구의 목적은 범죄두려움이 과연 개인의 특성에 따라서 어떻게 느끼게 되며 또한 얼마나 많은 영향을 받게 되는지를 실증적으로 검증하는 데에 그 목적이 있다. 이 연구의 조사결과 우선 범죄피해경험이 집단간의 차이가 통계적으로 유의미한 인구통계학적 특성은 연령, 결혼상태, 최종학력, 거주하는 장소였으며, 범죄피해의 취약성 정도는 성별과 결혼상태, 범죄관련 정보에 대한 관심은 성별, 연령, 최종학력, 가족 수입, 거주장소 위치에 따라서 집단 간의 통계적으로 유의미한 차이가 있는 것으로 나타났다. 둘째, 개인적 특성 요인과 범죄두려움의 상관관계 분석을 실시한 결과 독립변수 세요인 모두 범죄두려움과 통계적으로 유의미한 상관관계를 나타내고 있었으며, 특히 범죄피해에 대한 취약성 요인이 범죄두려움과 가장 상관관계가 높게 나타났다. 마지막으로 개인의 특성으로서 범죄피해의 취약성, 범죄정보에 대한 관심, 범죄피해경험은 범죄두려움에 영향을 미쳤으며, 특히 이러한 개인적 특성 요인 중 자신이 범죄피해에 대해 취약하다고 생각 하는 범죄피해의 취약성이 범죄두려움에 가장 많은 영향을 미치는 요인으로 나타났다.

  • PDF

성공적인 6차산업을 위한 가치사슬 모형과 빅데이터 활용 방안 (Value Chain Model and Big Data Utilization for a Successful the 6th Industry)

  • 박상혁;박정선;이명관
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.141-152
    • /
    • 2015
  • Our agriculture and rural villages have faced negative conditions in many reasons. To overcome this situation, a new change is needed by the 6th industrialization. Many agriculture and rural villages in Korea are pursuing the 6th industrialization through the convergence of the primary, secondary, and tertiary industries to vitalize agriculture and rural villages. But there are several problems with the 6th industrialization. There is a limit to the capacity building of the members of the rural organization and Korean agricultural base primary, secondary, and tertiary industries are weak all. In addition, it has been insufficient research for value chain management of the region as a whole; there has been no study of information sharing across the region for the 6th industrialization. This study is about value chain management model for successful the 6th industry with Quick Response System and the big data technology. In this study to provide the efficiency of 6th industry value chain management with customer's needs analysis using big data and research for the information share between the industries in the region through the information pipeline theory of the QR System. We hope that our study is helped to proceed successfully on the 6th industrialization in Korea.

QoS-Guaranteed Capacity of Centralized Cognitive Radio Networks with Interference Averaging Techniques

  • Wang, Jing;Lin, Mingming;Hong, Xuemin;Shi, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.18-34
    • /
    • 2014
  • It is widely believed that cognitive radio (CR) networks have an opportunistic nature and therefore can only support best-effort traffics without quality-of-service (QoS) guarantees. In this paper, we propose a centralized CR network that adopts interference averaging techniques to support QoS guaranteed traffics under interference outage constraints. In such a CR network, a CR user adaptively adjusts its transmit power to compensate for the channel loss, thereby keeping the receive signal power at the CR base station (BS) at a constant level. The closed-form system capacity of such a CR network is analyzed and derived for a single cell with one CR BS and multiple CR users, taking into account various key factors such as interference outage constraints, channel fading, cell radius, and locations of primary users. The accuracy of the theoretical results is validated by Monte Carlo simulations. Numerical and simulation results show promising capacity potential for deploying QoS-guaranteed CR networks in frequency bands with fixed primary receivers. Our work can provide theoretical guidelines for the strategic planning of centralized CR networks.

Cognitive Radio Based Spectrum Sharing: Evaluating Channel Availability via Traffic Pattern Prediction

  • Li, Xiukui;Zekavat, Seyed A. (Reza)
    • Journal of Communications and Networks
    • /
    • 제11권2호
    • /
    • pp.104-114
    • /
    • 2009
  • In this paper, a technique is proposed that enables secondary users to evaluate channel availability in cognitive radio networks. Here, secondary users estimate the utilization of channels via predicting the traffic pattern of primary user, and select a proper channel for radio transmission. The proposed technique reduces the channel switching rate of secondary users (the rate of switching from one channel to another) and the interference on primary users, while maintaining a reasonable call blocking rate of secondary users.

양자역학적 원자 및 분자 분석에 의한 정공의 이동 불가능성과 운반자로써의 주도 전자에 관한 이론 (A theory on the impossibility of the moving for hle and the primary electron as a carrier using the analyses, by quantum mechanics, of the structure of atoms and molecules)

  • 주정규
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.327-330
    • /
    • 1998
  • In this theory, we explained the impossibility of the motion or miving of the hole that has been recognized to be a carrier, by giving some fundamental reasons. We treated energy gap and impurity concentration, in p- and n-type region, as functions of the mobility that is one of te factors which determine current quantity, and analyzed the primary electron theory as a carrier by introducing 2 hypotheses.

  • PDF

홀로그래픽 영상 암호화 및 디코딩 기법 (Holographic image encryption and decoding scheme)

  • 양훈기;정대섭;김은수
    • 전자공학회논문지A
    • /
    • 제33A권12호
    • /
    • pp.97-103
    • /
    • 1996
  • This paper presents a new security verification technique based on an image encryption by a white noise image that serves as an encryption key. In the proposed method that resembles holographic process, the encryption process is executed digitally using FFT routine which gives chances for separating corruptive noise from reconstructed primary image The encoded image thus obtained is regarded as an nterference pattern caused by two lightwaves transmitted through the primary image and the white noise image. The decoding process is executed optically and in real-tiem fashion where lightwave transmitted through the white noise image illuminates the encrypted card.

  • PDF

카운팅 방법을 사용한 연역적 고장 시뮬레이션의 구현 (Implementation of deductive fault simulation using counting method)

  • 강신영;김규철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(2)
    • /
    • pp.176-179
    • /
    • 2000
  • Fault simulation is often necessary to determine the fault coverage of a given test, that is, to find all the faults detected by test. In this paper we implement a deductive fault simulation using counting method. Counting method uses f$\sub$i/ of fault table and Search list to compute set operation. f$\sub$i/ was counted by fault list of input gate. And we propagate fault list from primary inputs toward primary output by comparing with controling sum. It improved performance by reducing search of faults.

  • PDF

STRONGLY PRIME FUZZY IDEALS AND RELATED FUZZY IDEALS IN AN INTEGRAL DOMAIN

  • Kim, Myeong Og;Kim, Hwankoo
    • 충청수학회지
    • /
    • 제22권3호
    • /
    • pp.333-351
    • /
    • 2009
  • We introduce the concepts of strongly prime fuzzy ideals, powerful fuzzy ideals, strongly primary fuzzy ideals, and pseudo-strongly prime fuzzy ideals of an integral domain R and we provide characterizations of pseudo-valuation domains, almost pseudo-valuation domains, and pseudo-almost valuation domains in terms of these fuzzy ideals.

  • PDF

The Properties on Fuzzy Submachines of a Fuzzy Finite State Machine

  • Hwang, Seok-Yoon
    • 한국지능시스템학회논문지
    • /
    • 제13권6호
    • /
    • pp.749-753
    • /
    • 2003
  • In this paper we introduce the concepts on retrievability, separability and connectedness of fuzzy submachines, which generalize those of crisp submachines. And also we generalize crisp primary submachines to those with fuzziness, from which we obtain the decomposition theorem of fuzzy submachines.

Impact of Entry-Level Mathematics Subject-matter Knowledge on Student Teachers' Mathematics Pedagogical Content Knowledge Development and their Mathematics Teaching Practice Performance

  • Wong, Tak-Wah;Lai, Yiu-Chi
    • 한국수학교육학회지시리즈D:수학교육연구
    • /
    • 제16권1호
    • /
    • pp.51-66
    • /
    • 2012
  • This study investigated the impact of entry level of mathematics subject knowledge on student teachers' mathematics pedagogical content knowledge development and performance in mathematics teaching practice. The sample consisted of 24 mathematics student teachers, 12 of whom passed A-Level mathematics and 12 of whom only passed O-level mathematics. They were all studying in a 4-year bachelor of education (Honours/Primary) programme; they were either majoring or minoring in mathematics. Results showed that student teachers' entry-level mathematics subject knowledge is not related to their mathematics pedagogical content knowledge development or their mathematics teaching performance. These findings may lead society to consider whether student teachers who have passed O-level mathematics are already eligible to be trained as professional primary mathematics teachers. As a consequence, this study raises the issues of how to develop student teachers' mathematics pedagogical content knowledge and whether we need to restructure our bachelor of education (Primary) programmes' curriculum in teacher professionalism.