• Title/Summary/Keyword: 존재 증명

Search Result 529, Processing Time 0.027 seconds

Implications of Disciplinary Power in Tourism Destination (관광 공간에서 나타나는 규율 권력에 관한 소고 - 베트남 패키지 관광을 중심으로 -)

  • Oh, Jeong-Joon
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.4
    • /
    • pp.436-451
    • /
    • 2008
  • The purpose of this study is to prove that a tourism is not a personal act but a social product, through the examination of 'disciplinary power' existing in Vietnam package tour. The results are summarized as follows: A tour guide, together with the tourist agency, was the agent of the tourism. He exercised power by using surveillance, punishment, partition, and so on. Tourists were the target at first as they were under surveillance of the guide. However, they became self-regulatory actors, which is so called 'modern tourists' in this paper, by learning and internalizing how to be empowered. In this way, a tourist was transformed into the agent of the tourism finally. Power was not owned either by a guide or a tourist, rather it existed as guide tourist relations. Power was not restricted to a specific tourism destination but it existed in all destinations. In addition, power was not repressive but productive in a sense that tourists became self-regulatory actors. This kind of power is so called 'disciplinary power.'

  • PDF

Inoformation Compression of Myoelectric M-wave Evoked by Electrical Stimulus using AR Model (AR 모델을 이용한 전기자극에 대한 근신호 M -wave의 정보압축)

  • 김덕영;박종환;김성환
    • Journal of Biomedical Engineering Research
    • /
    • v.20 no.3
    • /
    • pp.307-314
    • /
    • 1999
  • This paper describes an informatlon compression of electrically evoked myoelectric signal, M-wave. This wave shows a direct response m lato-response of nerve conductlQn study and has a characteristic with finite time support. M-wave is a useful factor for investing neurodi~ease and is often desirable to have a compact description of its shape and time evolution. The aim of this paper is to show that the AR modeling IS a effective method for compressing an information of M-wave. First, AR model parameters of real M-wave are estimated. And then. they are verified by approximatmg a M-wave using estimated AR parameters and by comparing to other melhod, Hermite tlansform[4]. To concretely evaluate the proposed method, the NMSE(normalized mean square error) of approximation curves are compared. As a result, AR modeling is effective for M-wave assessment because of its capability for the information compression.

  • PDF

Fingerprint classification using the clustering of the orientation of the ridges (융선의 방향성분 군집화를 통한 효과적인 지문분류기법)

  • Park, Chang-Hee;Yoon, Kyung-Bae;Choi, Jun-Hyeog
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.6
    • /
    • pp.679-685
    • /
    • 2003
  • The cores and deltas of fingerprints designate the parts where the flow of the ridges change radically. Observations on the change of the orientation of the ridges around the cores and deltas enable us to guess the location of the cores and deltas. According]y clustering the orientation flowing to the same direction after doing research on the orientation of the ridges on the whole makes us see that the cores and deltas are shaping around the boundaries of the clustering area. It is also observed that The patterns of clustering of the orientation of the ridges classified as Arch, Tented Arch, Left loop, Right Loop and Whorl have its own characteristics respectively. In this paper the method of classifying the fingerprints effectively is proposed and proved its effectiveness by using the clustering of the orientation of the ridges, finding the cores of the fingerprints which don't secure the deltas.

Analysis of Meridian Response by Sound Stimulus in Body (음향 자극에 의한 인체 경락의 반응분석)

  • Kim, Yong-Chin;Jeong, Dong-Myong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.38 no.3
    • /
    • pp.47-54
    • /
    • 2001
  • This study is to analyze the impedance response in human body by acoustic stimulation on acupoints and contrast parte; for objectification of the meridian substance. It is to verify meridian pathway and channel theory or bio-energy in body. This paper proposes to make an hypothesis about the underground water theory. The meridian has not tube or pipe line type channel but bio-energy flow along the channel similar to flowing pattern of underground water in body. It was analyzed the current characteristic or impedance response after acoustic stimulation by sound wave of 5 specific tones. The response characteristics of current stimulation are measured by the average current magnitude and variation ratio or meridian. The current variation ratio or Live Meridian(gung) 33.2%, Heart Meridian(sang) 30.7% Kidney Meridian (gak) 33.1%, Spleen Meridian(chi) 33.9%, Lung Meridian (wo) 30.7% are to be compared to contrast parts (non-acupoint and meridian). In experimental results, meridian is discrimination to non-meridian, and 5 vital meridians have a reciprocal relationship with sound wave of 5 specific tones.

  • PDF

On Efficient Algorithms for Generating Fundamental Units and their H/W Implementations over Number Fields (효율적인 수체의 기본단수계 생성 알고리즘과 H/W 구현에 관한 연구)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1181-1188
    • /
    • 2017
  • The unit and fundamental units of number fields are important to number field sieves testing primality of more than 400 digits integers and number field seive factoring the number in RSA cryptosystem, and multiplication of ideals and counting class number of the number field in imaginary quadratic cryptosystem. To minimize the time and space in H/W implementation of cryptosystems using fundamental units, in this paper, we introduce the Dirichlet's unit Theorem and propose our process of generating the fundamental units of the number field. And then we present the algorithm generating our fundamental units of the number field to minimize the time and space in H/W implementation and implementation results using the algorithm over the number field.

Effects of Security Design and Investor Utilities on the Valuation of Mortgage-Backed Securities (MBS의 발행구조, 가치평가 몇 투자자 특성에 관한 연구)

  • Yoo, Jin
    • The Korean Journal of Financial Management
    • /
    • v.22 no.1
    • /
    • pp.147-179
    • /
    • 2005
  • It is frequently said that mortgage-backed securities (MBS) of different security designs are issued in an attempt to meet the varying needs and expectations of investors. If this is true indeed, MBS of complicated risk-return characteristics are likely to be priced higher than MBS of simple risk-return characteristics we. We test this implication by establishing a recombining binomial interest rate prepayment model with a burnout effect embedded. More specifically, we compare the relative values (utilities) of a pass-through and a PAC- Support collateralized mortgage obligation(CMO), and theoretically show why and how the CMO is more highly valued than is the pass-through. The model is established such that mortgage prepayment is a function of the current value of, and the past path of, the mort-gage market rate. Since we work on not the total value of the two MBS but the value of each tranche of either MBS, the test results could be robust to slightly different versions of similar tests, which may be done in the future.

  • PDF

FUZZY matching using propensity score: IBM SPSS 22 Ver. (성향 점수를 이용한 퍼지 매칭 방법: IBM SPSS 22 Ver.)

  • Kim, So Youn;Baek, Jong Il
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.1
    • /
    • pp.91-100
    • /
    • 2016
  • Fuzzy matching is proposed to make propensities of two groups similar with their propensity scores and a way to select control variable to make propensity scores with a process that shows how to acquire propensity scores using logic regression analysis, is presented. With such scores, it was a method to obtain an experiment group and a control group that had similar propensity employing the Fuzzy Matching. In the study, it was proven that the two groups were the same but with a different distribution chart and standardization which made edge tolerance different and we realized that the number of chosen cases decreased when the edge tolerance score became smaller. So with the idea, we were able to determine that it is possible to merge groups using fuzzy matching without a precontrol and use them when data (big data) are used while to check the pros and cons of Fuzzy Matching were made possible.

Web Contents Mining System for Real-Time Monitoring of Opinion Information based on Web 2.0 (웹2.0에서 의견정보의 실시간 모니터링을 위한 웹 콘텐츠 마이닝 시스템)

  • Kim, Young-Choon;Joo, Hae-Jong;Choi, Hae-Gill;Cho, Moon-Taek;Kim, Young-Baek;Rhee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.68-79
    • /
    • 2011
  • This paper focuses on the opinion information extraction and analysis system through Web mining that is based on statistics collected from Web contents. That is, users' opinion information which is scattered across several websites can be automatically analyzed and extracted. The system provides the opinion information search service that enables users to search for real-time positive and negative opinions and check their statistics. Also, users can do real-time search and monitoring about other opinion information by putting keywords in the system. Proposing technique proved that the actual performance is excellent by comparison experiment with other techniques. Performance evaluation of function extracting positive/negative opinion information, the performance evaluation applying dynamic window technique and tokenizer technique for multilingual information retrieval, and the performance evaluation of technique extracting exact multilingual phonetic translation are carried out. The experiment with typical movie review sentence and Wikipedia experiment data as object as that applying example is carried out and the result is analyzed.

Self-organization Networking Scheme for Constructing Infrastructure-less based IoT Network (비인프라 기반 사물인터넷 구축을 위한 자율네트워킹 기법)

  • Youn, Joosang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.196-201
    • /
    • 2018
  • Recently, various infrastructure-less IoT networking schemes have been studied to construct local IoT networks based on self-organization. This is, because RPL protocol, which is to support infrastructure based network construction is used to construct local IoT networks. Thus, a self-organization networking and ad hoc path between client and server in local IoT networks is not supported in basis RPL protocol. In this paper, we propose a self-organization networking scheme which support infrastructure-less based IoT network construction in low-power and lossy network based IoT environments consisting of IoT devices with the constrained feature, such as low power, the limited transmission rate and low computing capacity. Through simulation, we show that the proposed self-organization networking scheme improves the performance, in terms of the number of packets generated for end-to end data transmission and the end-to-end delay, compared to basis RPL protocol.

Performance Improvement of the Payload Signature based Traffic Classification System (페이로드 시그니처 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jun-Sang;Yoon, Sung-Ho;Park, Jin-Wan;Lee, Hyun-Shin;Lee, Sang-Woo;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1287-1294
    • /
    • 2010
  • The traffic classification is a preliminary and essential step for stable network service provision and efficient network resource management. While a number of classification methods have been introduced in literature, the payload signature-based classification method shows the highest performance in terms of accuracy, completeness, and practicality. However, the payload signature-based method has a significant drawback in high-speed network environment that the processing speed is much slower than other classification method such as header-based and statistical methods. In this paper, We describes various design options to improve the processing speed of traffic classification in design of a payload signature based classification system and describes our selections on the development of our traffic classification system. Also the feasibility of our selection was proved through experimental evaluation on our campus traffic trace.