The periodic square wave (PSW) model was successfully applied to the optimal design of a batch-storage network. The network structure can cover any type of batch production, distribution and inventory system, including recycle streams. Here we extend the coverage of the PSW model to multitasking semi-continuous processes as well as pure continuous and batch processes. In previous solutions obtained using the PSW model, the feedstock composition and product yield were treated as known constants. This constraint is relaxed in the present work, which treats the feedstock composition and product yield as free variables to be optimized. This modification makes it possible to deal with the pooling problem commonly encountered in oil refinery processes. Despite the greater complexity that arises when the feedstock composition and product yield are free variables, the PSW model still gives analytic lot sizing equations. The ability of the proposed method to determine the optimal plant design is demonstrated through the example of a high density polyethylene (HDPE) plant. Based on the analytical optimality results, we propose a practical process optimality measure that can be used for any kind of process. This measure facilitates direct comparison of the performance of multiple processes, and hence is a useful tool for diagnosing the status of process systems. The result that the cost of a process is proportional to the square root of average flow rate is similar to the well-known six-tenths factor rule in plant design.
The Journal of Korean Institute of Communications and Information Sciences
/
v.27
no.10C
/
pp.1015-1026
/
2002
As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.
The Journal of the Korea institute of electronic communication sciences
/
v.8
no.7
/
pp.1017-1023
/
2013
Datacommunications transmit the source codes that are coded in information devices, such as computer to the transmission line by means of the line coded signal. AMI method is applied to the line coding method to transmit the signal for long distance. The disadvantage of the AMI method is to loss the bit synchronization when consecutive binary bit '0' over 4ea is coming into line coder. The scrambling technique is used to overcome the problem. The HDB-3 scrambling method is used in Korea standard which standard in ITU-T. When the HDB-3 technology is used. the method should convert the consecutive bit '0' over 4ea to certain bits format. As a result, when there are many such kind of '0' bit stream in source codes, data transmission efficiency will be decreased to treat in line coder, etc. This paper is directed to study the Roman character code system in $KS{\times}1001$, Korea standard for information exchange code in datacommunication systems. Based on the study result, this paper proposed the maximum optimized Roman character code system. In the study, Character coding rule for $4{\times}4$bits and the statistical data for roman character using frequency were considered to simulate. The paper shows the result that when the proposed new roman character coding system is applied to use, the data transmission efficiency could be increased to about 134% compared to existing code system.
Journal of the Korean Data and Information Science Society
/
v.25
no.3
/
pp.601-609
/
2014
The most widely used data mining technique for big data analysis is to generate meaningful association rules. This method has been used to find the relationship between set of items based on the association criteria such as support, confidence, lift, etc. Among them, confidence is the most frequently used, but it has the drawback that we can not know the direction of association by it. The attributably pure confidence was developed to compensate for this drawback, but the value was changed by the position of two item sets. In this paper, we propose four symmetrically and attributably pure confidence measures to compensate the shortcomings of confidence and the attributably pure confidence. And then we prove three conditions of interestingness measure by Piatetsky-Shapiro, and comparative studies with confidence, attributably pure confidence, and four symmetrically and attributably pure confidence measures are shown by numerical examples. The results show that the symmetrically and attributably pure confidence measures are better than confidence and the attributably pure confidence. Also the measure NSAPis found to be the best among these four symmetrically and attributably pure confidence measures.
Journal of the Korean Institute of Oriental Medical Informatics
/
v.17
no.2
/
pp.130-287
/
2011
"zhenjiusunanyaozhi(鍼灸素難要旨)" is composed of three volumes and published in 1529 by Gao Wu(高武). Gao Wu(高武) is skillful in astronomy, the art of war and the law as well as a medical practitioner in Ming Dynasty. The books he wrote "zhenjiujuying(鍼灸聚英)", "zhizhi(直指)", "douzhenzhengzong(痘疹正宗)", "shexuezhinan(射學指南)", "zhenjiujieyao(鍼灸節要)". "zhenjiusunanyaozhi鍼灸素難要旨" is written by classifying the origin of acupuncture and moxibustion. In other words, it is edited by classifying the contents related to acupuncture and moxibustion out of the ancient Chinese medical book "yellow emperor's canon of medicine and yellow emperor eighty-one difficult" in which are composed of 3 volumes as follows, Volume 1 says the main diseases on "the nine acupuncture needles figure" (九針圖), "the reinforcing and reducing the meridian" (補瀉), "the needle depth" (針刺深淺), "the five shu points - metal, wood, water, fire, earth" (正,滎,輸,經,合) based on 18 chapters in terms of acupuncture in "yellow emperor eighty-one Difficult "難經"", in which it quotes the annotation of "the difficulty by the original meaning "難經本義"" written by Hua Shou(滑壽) in Yuan Dynasty. Volume 2 is composed of 2 parts. Part 1 says the method of treatment on 36 Chapters, the method of acupuncture use in the Linshu "靈樞" and the Suwen "素問" such as "the rule of acupuncture use" (用針方宜), "the nine-pin method" (九針式) and "the nine-pin to only use the time appropriate to consider nature of Heaven, Earth and person" (九針應天地人時以起用) etc., Part 2 says "the five difficult acupuncture(五亂刺)", "the rise and fall of energy and blood(氣血盛衰)". "the pain tolerance(耐痛)" and ect., in which are in terms of method of treatment collected the original texts of 59 chapters on acupuncture to each disease and of 8 chapters on moxibustion in the Linshu "靈樞" and the Suwen "素問". Volume 3 includes 10 chapters in which consist of "the stabbing to disease in 12 meridians (十二經病刺)", "the eight extra meridian disease (寄經八脈病)", "the twelve meridians(十二經脈)", "the fifteen collaterals (十五絡脈), the twelve meridian muscles (十二經筋)", "the acupoint (孔穴)" and etc. This is the book edited comprehensively by classifying the contents on the theory of acupuncture and moxibustion and the circulations of meridians in "yellow emperor's canon of medicine and yellow emperor eighty-one difficult" and there is no case story in particular except his comments in person. This study is for the purpose of helping researching and developing acupuncture and moxibustion and applying their clinical training.
Journal of the Korean Institute of Traditional Landscape Architecture
/
v.36
no.1
/
pp.11-19
/
2018
Changgyeonggung Palace, which was built in Seongjong Period in September 1484, is a tradition space that has been seen as a gateway to the Joseon Dynasty until it was demolished in 1907 at Changgyeongwon Garden. During the Japanese colonial rule, large greenhouses, museums, and botanical gardens were opened in Changgyeonggung Palace and traditional architecture and palace gardens were lost or changed. In 1984, the Changgyeonggung Palace maintenance plan was restored to the current status through the construction of the rebuild construction in 1986 to restore the traditional palaces. Since then, it has been maintained and managed in the shape of the mid-term plan of the 1980s for 30 years. The appearance of Changgyeonggung Palace(宮園) in the early 19th century shows the appearance of Changgyeonggung Palace in "Donggwoldo", and it is possible to confirm the prototype of the Joseon Dynasty through analysis of "Donggwoldo". The vegetation survey of Changgyeonggung Palace which started from 1984 was surveyed 4 times over 2005, 2010, and 2016, and the vegetation status of Changgyeonggung Palace could be confirmed based on the results of vegetation survey. By comparing and analyzing the results of the vegetation survey for 30 years and the analysis of the vegetation in Changgyeonggung Palace by the analysis of "Donggwoldo", we were able to confirm whether the vegetation status of Changgyeonggung Palace approached to the appearance of the Joseon Dynasty era.
While recommender systems were used by a few E-commerce sites former days, they are now becoming serious business tools that are re-shaping the world of I-commerce. And collaborative filtering has been a very successful recommendation technique in both research and practice. But there are two problems in personalized recommender systems, it is First-Rating problem and Sparsity problem. In this paper, we solve these problems using the associative relation clustering and “Lift” of association rules. We produce “Lift” between items using user's rating data. And we apply Threshold by -cut to the association between items. To make an efficiency of associative relation cluster higher, we use not only the existing Hypergraph Clique Clustering algorithm but also the suggested Split Cluster method. If the cluster is completed, we calculate a similarity iten in each inner cluster. And the index is saved in the database for the fast access. We apply the creating index to predict the preference for new items. To estimate the Performance, the suggested method is compared with existing collaborative filtering techniques. As a result, the proposed method is efficient for improving the accuracy of prediction through solving problems of existing collaborative filtering techniques.
The present study describes the evaluation of the bioequivalence of two atorvastatin tablets, Lipitor $Tablet^{(R)}$ (Pfizer, reference drug) and Atorva $Tablet^{(R)}$ (Yuhan, test drug), according to the guidelines of Korea Food and Drug Administration (KFDA). Forty-nine healthy male Korean volunteers received each medicine at the atorvastatin dose of 40 mg in a $2{\times}2$ crossover study with a two weeks washout interval. After drug administration, serial blood samples were collected at a specific time interval from 0-48 hours. The plasma atorvastatin concentrations were monitored by an high performance liquid chromatography -tandem mass spectrometer (LC-MS/MS) employing electrospray ionization technique and operating in multiple reaction monitoring (MRM) and positive ion mode. The total chromatographic run time was 4.5 min and calibration curves were linear over the concentration range of 0.1-100 ng/mL for atorvastatin. The method was validated for selectivity, sensitivity, linearity, accuracy and precision. $AUC_t$ (the area under the plasma concentration-time curve from time zero to 48hr) was calculated by the linear log trapezoidal rule method. $C_{max}$ (maximum plasma drug concentration) and $T_{max}$ (time to reach $C_{max}$) were complied trom the plasma concentration-time data. Analysis of variance was carried out using logarithmically transformed $AUC_t$ and $C_{max}$. No significant sequence effect was found for all of the bioavailability parameters indicating that the crossover design was properly performed. The 90% confidence intervals of the $AUC_t$ ratio and the $C_{max}$ ratio for Atorva $Tablet^{(R)}$ / Lipitor $Tablet^{(R)}$ were ${\log}\;0.9413{\sim}{\log}\;1.0179$ and ${\log}\;0.831{\sim}{\log}\;1.0569$, respectively. These values were within the acceptable bioequivalence intervals of ${\log}\;0.8{\sim}{\log}\;1.25$. Based on these statistical considerations, it was concluded that the test drug, Atorva $Tablet^{(R)}$ was bioequivalent to the reference drug, Lipitor $Tablet^{(R)}$.
This paper is to investigate how two elementary school teacher's belief mathematics as educational content, and teaching and learning mathematics as a part of educational methodology, and what the two teachers believe towards gifted children and their education, and what the classes demonstrate and its effects on the sociomathematical norms. To investigate this matter, the study has been conducted with two teachers who have long years of experience in teaching gifted children, but fall into different belief categories. The results of the study show that teacher A falls into the following category: the essentiality of mathematics as 'traditional', teaching mathematics as 'blended', and learning mathematics as 'traditional'. In addition, teacher A views mathematically gifted children as autonomous researchers with low achievement and believes that the teacher is a learning assistant. On the other hand, teacher B falls into the following category: the essentiality of mathematics as 'non-traditional', teaching mathematics as 'non-traditional, and learning mathematics as 'non-traditional.' Also, teacher B views mathematically gifted children as autonomous researchers with high achievement and believes that the teacher is a learning guide. In the teacher A's class for gifted elementary school students, problem solving rule and the answers were considered as important factors and sociomathematical norms that valued difficult arithmetic operation were demonstrated However, in the teacher B's class for gifted elementary school students, sociomathematical norms that valued the process of problem solving, mathematical explanations and justification more than the answers were demonstrated. Based on the results, the implications regarding the education of mathematically gifted students were investigated.
There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.