• Title/Summary/Keyword: 유효성

Search Result 8,073, Processing Time 0.043 seconds

Control of the Rice Stem Borer(Chilo suppressalis) with the new Insecticides

  • Paik Woon Hah;Choi Seung Yoon;Yun Soon Ki;Im Moon Soon
    • Korean journal of applied entomology
    • /
    • v.1
    • /
    • pp.51-53
    • /
    • 1962
  • 1. 본시험은 이화곤충방제에 유효하다고 인정된 신살충제를 선정하여 이화곤충에 대한 살충효과의 재확인 및 살포적기를 구명코저 시행하였다. 2. 제일화기에 있어서 Diazinon, Lebaycild, Endrin 및 Folidol은 부화 14일전 처리로서도 부화유충의 식입제로서 유효하였고, 부화유충 식입후일처리구에 있어서도 무처리구에 비하여 유효하였다. 3. 제2화기에 있어 부화 21일전 처리구의 유효성은 Detron=Folidol>$\gamma$-dol>Endrin>Dimecron의 순이었다. 그리고 부화 14일 및 17일전과 부화 2일 및 7일후 처리에 있어서도 $\gamma-dol$을 제한 다음 약제들은 고도의 유효성을 나타내었다. 4. 그러나 약제처리시기 사이에는 유의성이 없었다. 5. 본시험은 1회의 시험성적임으로 동일시험이 수회반복되어 살충효과 및 살포적기가 완전히 구명되었으면 한다.

  • PDF

Validation of Lightscape as Outdoor Lighting Simulation with ProMetric (ProMetric을 이용한 Lightscape의 경관조명 시뮬레이션 유효성 검증)

  • Yi, So-Mi;Choi, Yoon-Seok;Kim, Jeong-Tai
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.43-48
    • /
    • 2004
  • 야간 경관조명을 계획 및 평가하는데 필요한 물리량의 측정기법이나 컴퓨터 시뮬레이션의 유효성에 대한 검증이 미흡한 상황이다. 이에 본 연구 경관조명에 많이 사용되는 대표적 프로그램인 Lightscape 3.2의 유효성을 Radiant Imaging ProMetric 1400을 이용하여 검증한 것이다. 교량의 7개 부분에 대한 평균 휘도값을 비교한 결과 Radiant Imaging ProMetric 1400에 의한 물리량 측정값과 Lightscape 3.2의 컴퓨터 시뮬레이션 값 사이에는 상대오차율이 평균 8.3%로 나타나, Lightscape 3.2가 경관조명의 사전 시뮬레이션 도구로써 매우 유효한 것으로 나타났다.

  • PDF

Nonparmetric Method for Identifying Effective and Safe Doses using Placement (유효하고 안전한 용량 결정에 위치를 이용한 비모수적 방법)

  • Kim, Sunhye;Kim, Dongjae
    • The Korean Journal of Applied Statistics
    • /
    • v.27 no.7
    • /
    • pp.1197-1205
    • /
    • 2014
  • Typical clinical dose development studies consist of the comparison of several doses of a drug with a placebo. The primary interest is to find therapeutic window that satisfying both efficacy and safety. In this paper, we propose nonparametric method for identifying effective and safe doses in linear placement using score function. The Monte Carlo simulation is adapted to estimate the power and the family-wise error rate(FWE) of proposed procedure are compared with previous methods.

A Proposal of Distributed OCSP Server Construction Considering Security (보안성을 고려한 분산된 OCSP 서버 구축 제안)

  • Ko, Hoon;Kim, Dae-Won;Jang, Ui-Jin;Shin, Yong-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.793-795
    • /
    • 2003
  • 공개키 기반 구조는 공개키의 무결성을 제공해 주기 위해서 인증서를 발행한다. 그리고 인증서의 유효성을 체크하기 위해서 인증서 취소 목록(Certificate Revocation List : CRL)을 다운받아서 유효성을 검사하지만 사용자가 증가와 CRL의 크기 증가로 인해서 많은 부담이 된다. 그래서 최근에는 온라인상으로 유효성을 검사하는 OCSP(Online Certificate Status Protocol)이 대안방안으로 발표되었지만 이 또한 하나의 인증서 저장소에 집중화됨으로써 문제가 발생된다. 따라서 OCSP 서버를 분산된 위치에 배치하여 집중화 문제를 방지하고자 한다.

  • PDF

Pattern Validation using Temporal Logic for Fraud Detection (부정행위 탐색을 위한 시간 논리 기반의 패턴 유효성 검사 방법)

  • 이건수;김민구;이형수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.148-150
    • /
    • 2004
  • 부정행위 탐지는 개별 사용자의 행동 기록과 그 사용자와 유사한 프로필을 갖고 있는 사용자들의 행동 기록을 바탕으로 행동 패턴 혹은 행동 규칙을 찾아내, 이 패턴/규칙과의 비교를 통해 현재 행위가 부정한 것인지를 결정하는 방법을 주로 사용한다. 그러나, 특정 사용자의 행위패턴이 급격하게 바뀌는 경우, 과거의 기록을 바탕으로 생성된 패턴의 유효성은 보장받을 수 없다. 더구나 기존 기록과 상이한 행위에 대한 새로운 패턴이 생성되기 위해서는 계속해서 그런 행위가 쌓여야만 하고, 그 쌓이는 양은 기존 패턴의 견고성에 비례된다. 또한 동일 사용자에게 털러 패턴을 적용시키는 방법 역시 패턴간의 충돌이 일어나는 등의 한계가 존재한다. 본 논문에서는 시간 논리(Temporal Logic)를 적용하여, 과거의 패턴의 유효성을 검증하고 신규패턴을 빠르게 찾아내는 방법을 제안하고자 한다.

  • PDF

Numerical Study on the Validity of Scaling Law for Compartment Fires (구획 화재의 상사 법칙 유효성에 관한 수치해석 연구)

  • Ko, Gwon-Hyun
    • Fire Science and Engineering
    • /
    • v.28 no.4
    • /
    • pp.29-34
    • /
    • 2014
  • In this study, to assess the validity of scaling law which was based on the ventilation factor and utilized in fields of compartment fires, numerical simulations were conducted on full- and 2/5 reduced-scale compartment fires using FDS and simulation results were compared with the previously published experimental data. The numerical modeling used in this study was verified by comparing the predicted temperature at several points of the upper layer with the experiment data. Temperature and concentration distribution inside of compartments and velocity profile at door of compartment are analyzed to assess the validity of scaling law. Comparison between the predicted results on the full- and reduced-scale compartments shows good agreements on the inner compartment flow patterns, outflowing flame patterns from the compartments, and vertical temperature distributions.

Verifying the Validity of the Qualitative Evaluation Indexes for Venture Firms' Investment Review: Case Study (벤처기업 투자 심사를 위한 정성 평가 지표의 유효성 검증: 사례연구)

  • Kim, Byounggwan;Kim, Wanki
    • Journal of Technology Innovation
    • /
    • v.25 no.4
    • /
    • pp.79-105
    • /
    • 2017
  • As the size of venture firm's operating funds continues to increase, the scope of work of the investment jurisdiction is increasing dramatically as well. However, investment decisions vary widely, depending on the competence of the judges. This follow-up study recommends verifying the validity of the effectiveness of venture investments by validating the efficacy of assessing venture investment indexes. After verifying the assessment indexes for 100 venture firms, the study noted that the efficacy of the survey as a qualitative evaluation measure was approximately 85% hit, which can act as a yardstick for investment decisions. The results of this study can contribute toward the decision making power of venture companies in terms of investments.

An Efficient Certificate path Discovery Algorithm Making High a Certificate Path Validity. (인증 경로의 유효성을 높이는 효율적인 인증 경로 설정 알고리즘)

  • Choi Yeon hee;Jun Moon seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1722-1728
    • /
    • 2004
  • To discover a certificate path is a very important topic in the PKI with a lot of candidate paths. The certificate path discovery processing is executed via many verifications and as the number of verification times increases, the validity of the discovered path becomes high. The selection of the path with high validity provides high-speed certificate validation by reducing the number of repetition times of path discovery and validation processing. Otherwise, there is a problem that the speed and computation overheads are increased. In this paper, we propose an efficient certificate path discovery algorithm can make high the certificate validity with low overhead.

The Validity Verifying of Evaluation Object Method Proposal in Subject evaluation experiment for Exterior Lighting (경관조명 주관평가 실험에서의 평가대상 제시 방법에 대한 유효성 검증)

  • 이진숙;유재연;김병수
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.4
    • /
    • pp.1-7
    • /
    • 2003
  • This is basic study for analyzing the character of the evaluation according to the ways of exterior lighting through the image prediction experiment by computer simulation. The aim of this research is to verify the validity of physical quantity & subjective evaluation on the basis of Online experiment. The following carried out the experiment procedure by conditions of Online experiment, 1) to make a photo of Online experirrent, 2) to measure physical quantity of luminance, and 3) to do subjective evaluation in Online experiment by means of vocabulary of the evaluation through preparation experiment. Then to verify the validity of Online and CG experiment, Online and photo experiment with each subjective evaluation results. The result of this study is that the validity difference is within 5% in the verification the validity of the physic amount, which showed little difference. While in verification of subjective evaluation of online and CG, online and photo experiment, the result is showed little difference as well except a little the item.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.