• Title/Summary/Keyword: rules

Search Result 7,751, Processing Time 0.032 seconds

ON PERTURBED TRAPEZOIDAL AND MIDPOINT RULES

  • Cerone, P.
    • Journal of applied mathematics & informatics
    • /
    • v.9 no.2
    • /
    • pp.593-605
    • /
    • 2002
  • Explicit hounds are obtained for the perturbed, or corrected, trapezoidal and midpoint rules in terms of the Lebesque norms of the second derivative of the function. It is demonstrated that the bounds obtained are the same for both rules although the perturbation or the correction term is different.

A Study on Testing the Korean Cataloguing Rules through Analyzing the RDA Test (RDA 테스트 분석을 통해 본 한국목록규칙의 테스트 방안에 관한 연구)

  • Lee, Mihwa;Hyun, Moonsoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.1
    • /
    • pp.155-176
    • /
    • 2015
  • This study was for suggesting the test methods in the revision process of the cataloging rules to understand the problem of draft cataloging rules and to apply the new cataloging rules correctly in libraries instead of collecting the opinions by the traditional seminar and conference in the process of revising KCR, KCR2, KCR3, KCR4. For this study, the literature review and the case study were used as the research methods. The case study was based on the US RDA Test by US RDA Test Coordinating Committee. The evaluation areas of the test were cataloging rules, record creation and system development by reflecting the new cataloging rules, user, and cost. The data for the analysis was the creation of bibliographic records and authority records by librarians, and the question investigations that were the use of institutions, librarians, and users. This study would contribute to revise the cataloging rules in future by analyzing the errors of applying new rules to bibliographic record and by investigating the difficulties of applying rules in completing the bibliographic record. Also, the libraries could be easy to decide to implement the new rules from the creation time of bibliographic record by new rules and the learning curve of new rules.

A Systematic Method of Hinting Interface Design (체계적인 힌팅 인터페이스 설계 방법의 연구)

  • Lee, Eun-A;Yun, Wan-Cheol;Park, Wan-Su
    • Journal of the Ergonomics Society of Korea
    • /
    • v.25 no.2
    • /
    • pp.125-134
    • /
    • 2006
  • Most users learn new, complex systems through trial-and-error experience rather than referring to the manuals in a cognitive process that is called 'exploratory learning'. While exploring a system, people find prototypical rules for using the system based especially on frequent tasks. The rules are formed from consistent task procedures and well-expected interface elements on the designed system. These rules play the role of the basis of users' knowledge for performing tasks. The decision making to select and apply those rules interacting with an interface can be aided by properly provided hints on the interface. With appropriate hints, users can learn new systems easily and use them with reduced usability problems. This paper first reports an observation of user behavior performing tasks with prototypical interaction rules and finds a sound set of criteria to extract prototypical interaction rules systematically. Two types of hints are defined. Extending hints prompt users to apply prototypical interaction rules beyond well-known tasks. Preventive hints guide users out of possible capture errors by drawing attention to the variation of rules. A systematic and practical method is proposed to identify the opportunities for both types in designing interfaces. It is then verified through a usability test that the proposed method is effective in identifying the locations and types of appropriate hints to reduce or mitigate usability problems.

A Study on Comparison of Combination Rules for the Seismic Analysis on Curved Bridges with the Different Radiuses of Curvature (곡선교의 내진 해석 시 곡률에 따른 하중 조합 방법의 비교에 관한 연구)

  • Ryu, Dong-Hyeon;Shin, Myoung-Gyu;Park, Jin-Wan;Kim, Moon-Kyum
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2008.04a
    • /
    • pp.567-572
    • /
    • 2008
  • This paper's purpose is to improve determining of the critical response of curved bridge to multi-component seismic motion. There are several methods to combine responses by multi-component excitation response, 30%, 40% rules and square-root-of-sum (SRSS). These combination rules determine same value of critical response in straight bridges. However, each method has critical response value of different magnitude in curved bridges. Thus a study about critical response of curved bridges is required. This paper presents comparison critical responses value as each combination rule, 30%, 40% rules and SRSS on curved bridges with the different radiuses of curvature. This study was carried out by response spectrum analysis of OO IC steel box girder bridge using SAP2000. It is concluded as follows: 1) In curved bridges, 30% and 40% rules tend to underestimate the critical response relatively to SRSS. 2) When bridges have smaller radiuses than 100m, difference between SRSS and 30% or 40% rules let run errors up as radiuses of curvature decreased.

  • PDF

Selecting Fuzzy Rules for Pattern Classification Systems

  • Lee, Sang-Bum;Lee, Sung-joo;Lee, Mai-Rey
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.2
    • /
    • pp.159-165
    • /
    • 2002
  • This paper proposes a GA and Gradient Descent Method-based method for choosing an appropriate set of fuzzy rules for classification problems. The aim of the proposed method is to fond a minimum set of fuzzy rules that can correctly classify all training patterns. The number of inference rules and the shapes of the membership functions in the antecedent part of the fuzzy rules are determined by the genetic algorithms. The real numbers in the consequent parts of the fuzzy rules are obtained through the use of the descent method. A fitness function is used to maximize the number of correctly classified patterns, and to minimize the number of fuzzy rules. A solution obtained by the genetic algorithm is a set of fuzzy rules, and its fitness is determined by the two objectives, in a combinatorial optimization problem. In order to demonstrate the effectiveness of the proposed method, computer simulation results are shown.

The Case Study and Its Implication on the Breach of Rules of Origin in FTAs (FTA 원산지규정 위반 판정사례와 시사점)

  • Lee, Young-Soo;Kwon, Soon-Koog
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.493-518
    • /
    • 2011
  • The term rules of origin(RoO) actually speaks for itself, referring to the rules which determine the origin of goods in international trade. The importance of RoO has grown significantly as preferential agreements expand and countries have treated similar imported goods differently according to where the product was made. The purpose of this paper is to study the main case study and its implication of RoO in FTAs. According to survey, the degree of using FTAs in Korea export firms is sharply low. Major reasons are that rules of origin differ from country to country in the FTAs, and that Korean firms have yet to work out what the RoO are. Chapter II of this paper views criteria of the determination country of origin of goods. Chapter III introduces the main case study of FTA rules of origin. Chapter VI presents implication through the case studies and finally concluded this study. In conclusion, Korea needs to build up its own position for rules of origin and provides rules of origin experts into the market. In-depth study and evaluation about Korea's existing FTAs RoO should be carried out to prepare for future FTAs.

  • PDF

The Problems and Solutions in the Laws and Regulations regarding Anti-Dumping in China (중국 반덤핑법제상의 문제점과 해결방안)

  • Choi, Seok-Beom
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.361-387
    • /
    • 2010
  • China has been the number one target of anti-dumping cases. In the middle of 1990s, China began to make anti-dumping rules to protect its domestic markets. The first anti-dumping regulation was mentioned in 1994 and the anti-dumping and anti-subsidy regulation was published in 1997. In 2001, China entered into the WTO and as a member of WTO, China is obliged to revise its anti-dumping rules in accordance with WTO's requirements. After that China amended anti-dumping rules in 2004 and it is still valid. Even though China makes considerable efforts to make the rules to be consistent with WTO Rules, China is still facing various difficulties such as lack of transparency, absence of definite deadlines, mismatch between rules, lack of clear interest criteria, overly hard questionnaires and inadequacy of judicial review and non-market economy. This paper deals with the current situation of anti-dumping system in China and the scheme of antidumping law and regulations and the main contents of that law and regulations. The purpose of this paper is to contribute to the enhancement of China's anti-dumping rules by studying the problems and solutions of the anti-dumping rules in China.

  • PDF

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad;Taghezout, Noria
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.688-710
    • /
    • 2016
  • Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.

A Study on the Process of Changes of Headings in the Cataloging Rules (목록규칙에 있어서의 표목부의 변천에 대한 연구- 한국목록규칙과 영미계목록규칙을 중심으로 -)

  • Chung Ok-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.30 no.3
    • /
    • pp.85-108
    • /
    • 1996
  • This paper studied the process of changes of the heading which is access point of the catalog in the cataloging Rules. The first described change of the concept of heading, and described change of headings in the Korean Cataloging Rules and Anglo-American Cataloging Rules And then described heading; in the online environment and future of cataloging rules. The concept of the main entry has lost any meaningful purpose in today's online catalog environment despite a multiplicity of definition. To bring cataloging rules up-to-date, Headings of KCR, AhCR2 Chapter 21, the MARC format and KORMARC format need to be revised The revision of this cataloging rules should be based on Hypertext and Hypermedia. A Continued empirical research would be most welcome, and should be incorporated into future cataloging rules.

  • PDF

An Implementation of Optimal Rules Discovery System: An Integrated Approach Based on Concept Hierarchies, Information Gain, and Rough Sets (최적 규칙 발견 시스템의 구현: 개념 계층과 정보 이득 및 라프셋에 의한 통합 접근)

  • 김진상
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.232-241
    • /
    • 2000
  • This study suggests an integrated method based on concept hierarchies, information gain, and rough set theory for efficient discovery rules from a large amount of data, and implements an optimal rules discovery system. Our approach applies attribute-oriented concept ascension technique to extract generalized knowledge from a database, knowledge reduction technique to remove superfluous attributes and attribute values, and significance of attributes to induce optimal rules. The system first reduces the size of database by removing the duplicate tuples through the condition attributes which have no influences on the decision attributes, and finally induces simplified optimal rules by removing the superfluous attribute values by analyzing the dependency relationships among the attributes. And we induce some decision rules from actual data by using the system and test rules to new data, and evaluate that the rules are well suited to them.

  • PDF