• Title/Summary/Keyword: Assignment Method

Search Result 834, Processing Time 0.023 seconds

Research of Qijingbamai(奇經八脈) Pulse Diagnosis Method, Qikoujiudaomai(氣口九道脈) (기경팔맥(奇經八脈)의 맥진법(脈診法)인 기구구도맥(氣口九道脈)에 관(關)한 연구(硏究))

  • Hwang, Jung-Il;Lee, Jun-Beom;Hwang, Min-Sub;Yoon, Jong-Hwa
    • Journal of Acupuncture Research
    • /
    • v.22 no.4
    • /
    • pp.165-178
    • /
    • 2005
  • Objectives : In this thesis we researched Qikooujiudaomai(氣口九道脈) which is one of pulse diagnosis method recorded in Maijing(脈經). Methods : We studied relativity of Shierjingmai(十二經脈) & Qijingbamai(奇經八脈), and different assignment of Shierjingmai(十二經脈) & Anzhenfa(按診f法) of Qikoumai(氣口脈), Liubuding-weimaizhenfa(六部定位脈診法) and Qikoujiudaomai(氣口九道脈), Shierjingmai(十二經脈) for the principle of Qijingbamai(奇經八脈) pulse diagnosis method, Qikooujiudaomai(氣口九道脈). Results : 1. Qikoujiudaomai(氣口九道脈) applied Qikoumai(氣口脈), Sambujiuhoujin(三部九候診) of $\ll$Nanjing Shiebanan(難經 券十八難)$\gg$. 2. Interpreting the diagnostic sense of 'Nei(內) Wai(外)' word in Qikoujiudaomai (氣口九道脈) recored in $\ll$Maijing(脈經) Juanshi(卷十) Shoujiantu(手檢圖)$\gg$ as Fuan(浮按) Chenan(沈按)corresponds with Qikoumai(氣口脈), Sanbujiuhouzhen(三部九候診) which accepeted Sanbujiuhouzhen(三部九候診) of $\ll$Su Wen(素間) San Bu Jiu Hou Lun(三部九候論)$\gg$. 3. The pulse shape of Qikoujiudaomai(氣口九道脈) does not appear independently unless the disease at Qijingbamai(奇經八脈) exist. and when one disease take sick, the pulse shape apears as Qishi(氣質).

  • PDF

Construction of Sequential Digital Systems over Finite Fields (유한체상의 순차디지털시스템 구성)

  • Park, Chun-Myoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2724-2729
    • /
    • 2010
  • This paper presents a method of constructing the sequential digital systems over finite fields. We assign all elements in finite fields to digit codes using mathematical properties of finite fields. Also, we discuss the operational characteristics and properties of the building block T-gate which is used to implement the sequential digital systems over finite fields. Then, we implemented sequential digital systems without feed-back. The sequential digital systems without feed-back is constructed as following steps. First, we assign the states in state-transition diagram to state digit codes, then obtain the state function and predecessor table which is explaining the relationship between present states and previous states. Next, we obtained the next-state function from state function and predecessor table. Finally we realize the circuit using T-gate and decoder. The proposed method is more efficiency and systematic than previous method.

Using of the "Consolidated Standards of Reporting Trials:CONSORT" to heighten quality of Medical Education study (의학교육연구의 질을 향상시키기 위한 '연구보고의 표준' 의 활용)

  • Yoo, Ji-Soo
    • Korean Medical Education Review
    • /
    • v.10 no.2
    • /
    • pp.25-44
    • /
    • 2008
  • Objectives: Through using of the strong research method like a Randomized Controlled Trial: RCT, we have to heighten quality of Medical Education study. I'd like to introduce "CONSORT", which stands for Consolidated Standards of Reporting Trials. Contents: Preventive Service Task Force(200l) in USA proposed Levels of evidence for enlarging evidence-based Practice: EBP. And the CONSORT was introduced, which encompasses various initiatives developed by the CONSORT Group to alleviate the problems arising from inadequate reporting of randomized controlled trials (RCTs). the CONSORT has 13 guides like these: 1. How participants were allocated to interventions 2. Scientific background and explanation of rationale 3. Eligibility criteria for participants. The settings and locations where the data were collected. 4. Precise details of the interventions intended for each group and how and when they were actually administered 5. Specific objectives and hypotheses 6. Clearly defined primary and secondary outcome measures, When applicable. any methods to enhance the quality of measurements (e.g., multiple observations, training of assessors) 7. How sample size was determined. When applicable, explanation of any interim analyses and stopping rules 8. Method used to generate the random allocation sequence, Details of any restriction [of randomization] 9. Method used to implement the random allocation sequence 10. Who generated the allocation sequence, who enrolled participants. and who assigned participants to their groups 11. Whether or not participants, those administering the interventions, and those assessing the outcomes were blinded to group assignment. If done, how the success of blinding was evaluated 12. Statistical methods used to compare groups for primary outcome(s), Methods for additional analyses, such as subgroup analyses and adjusted analyses 13. Flow of participants through each stage (a diagram is strongly recommended) Specifically, for each group report the numbers of participants randomly assigned. receiving intended treatment, completing the study protocol. and analyzed for the primary outcome. Results and Conclusion: Randomized Controlled Trial: RCT guided of CONSORT will contribute to do stronger evidence-based medical studies.

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.

Lateral-Directional Dynamic Inversion Control Applied to Supersonic Trainer (초음속 고등훈련기 가로-방향축 모델역변환 비행제어법칙 설계)

  • Kim, Chongsup;Ji, Changho;Cho, In-Je
    • Journal of Aerospace System Engineering
    • /
    • v.8 no.4
    • /
    • pp.24-31
    • /
    • 2014
  • The modern version of aircrafts is allowed to guarantee the superior handing qualities within the entire flight envelope by imposing the adequate stability and flying qualities on a target aircraft through the various techniques of flight control law design. Generally, the flight control law of the aircraft in service applies the various techniques of the verified control algorithm, such as dynamic inversion and eigenstructure assignment. The supersonic trainer employs the RSS(Relaxed Static Stability) concept in order to improve the aerodynamic performance in longitudinal axis and the longitudinal control laws employ the dynamic inversion with proportional-plus-integral control method. And, lateral-directional control laws employ the blended roll system of both beta-betadot feedback and simple roll rate feedback with proportional control method in order to guarantee aircraft stability. In this paper, the lateral-directional flight control law is designed by applying dynamic inversion control technique as a different method from the current supersonic trainer control technique, where the roll rate command system is designed at the lateral axis for the rapid response characteristics, and the sideslip command system is adopted at the directional axis for stability augmentation. The dynamic inversion of a simple 1st order model is applied. And this designed flight control law is confirmed to satisfy the requirement presented from the military specification. This study is expected to contribute to design the flight control law of KF-X(Korean Fighter eXperimental) which will proceed into the full-scale development in the near future.

A Study on RF Calibration Method of Next Generation Mobile Communication System (차세대 이동통신 시스템의 RF Calibration 기법에 관한연구)

  • Kim, Wan-Tae;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.859-864
    • /
    • 2010
  • In the next generation system, a study on realization of Multi-Core system is in progress for applying it in multi service network. Therefore some mobile systems are expected to be appeared. These systems can support WiBro, WCDMA, CDMA, etc with single terminal. These systems have to support various FA using broadband frequency and hand over to other service network. Especially, in the telecommunication system composed of cell, the transmit power can be interference at adjacent system, has effect on system channel capacity and cell size. In this paper, we improve the unstable transmit power caused by unsettled system operation, propose the RF(Radio Frequency) Calibration method which can use the transmit power stably even during hand over between heterogeneous networks causing unstable power change. Also we used proposed method and analysed used electricity of system during hand over between heterogeneous networks.

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

The Study on Reading Education Method to Improve the Cognitive Ability for the Petty officer Majoring Students in Community College (전문대학 부사관과의 인지 능력 향상을 위한 읽기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.123-131
    • /
    • 2018
  • The goal of this study is to look deeper into a reading education method for improving cognitive abilities of petty officer majoring students in community college level. Lack of the cognitive ability through the passing status of reading information processing highly can cause a problem for understanding information of context. Therefore, this study redefines the reading step to improve the cognitive ability. also, it sets up progress steps; material selection - learning - inspection - practice based on the cognitive abilities. To achieve those goals, there are two major ways. The first, setting up a proper reading assignment that is suitable for petty officer major students in community college level is a key step for this study. Second, the instructor leads the students to judge their own cognitive ability objectively by using a portfolio curriculum which contains a checking list of the portfolio, structuring a curriculum based on weekly achievements, self-checking, and setting up a direction of practice. The two presented ways are the most effective ways to develop students' cognitive ability based on continuous reading and checking. For the last, the study mentions a proposal for further tasks in this field of the study.

  • PDF

A Study on the Relationship between Person-Job Fit and Job Satisfaction shown in the Panel Data for 2008-2017 (2008-2017 패널분석 결과에 나타난 개인-직무 적합성과 직무만족 간의 관계)

  • Qu, Qing-Qing;Lee, Jeong-Hyun
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.4
    • /
    • pp.87-118
    • /
    • 2019
  • The purpose of this study is to examine the effects of person-job fit, which consists of educational fit and skill fit, on employees' intrinsic job satisfaction. To the end, the 10-year balanced panel data of the Korean Labor and Income Panel Study(KLIPS) by the Korea Labor Institute (KLI) for 2008-2017 are utilized. This study analyzes 12,730 observations by 1,273 employees by using fixed effect model, random effect model, and pooled OLS estimation method. The empirical results are as follows: First, it is founded that educational fit and skill fit seem affect job satisfaction positively. Second, the negative effects of over-education are clear and the negative effects of under-education are unclear, while the effects of over-skilled and under-skilled are insignificant statistically. Third, the results imply that the size of effect of over-education on intrinsic job satisfaction is larger than that of the effect of over-skilled. Forth, it is shown that the use of fixed effect model is more effective and trustworthy than that of random effect model and pooled OLS estimation method, implying that the effect size of coefficients which are estimated by pooled OLS method and random effect model are likely over-estimated. The empirical results above imply that firms and employees should focus on solving over-education issue before all in order to enhance employees' job satisfaction and it is needed to monitor regularly whether systemic job assignment process is done based on the employees' educational attainment and skill level and to provide more chances for job re-allocation and job rotation.

The Problem of the Quality of the Predecessor Activity on the Time and Cost of the Successor Activity in the Project Schedule - Project Schedule with Resource Constraints - (프로젝트 일정에서 선행활동 품질이 후행활동의 시간과 비용에 미치는 문제 - 자원제약이 존재하는 프로젝트 일정문제 -)

  • Kim, Gab Sik;Bae, Byeong Man;Ahn, Tae Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.2
    • /
    • pp.265-286
    • /
    • 2022
  • Purpose: The time and cost of a project activity exists in a selected mode and there is a quality level for the selected mode, and the time and cost of the current activity is determined by the quality level of the preceding activity. When an activity is a predecessor activity of an activity, it is characterized as a trade-off problem in which the time and cost of the activity are determined according to the quality level of the activity. Methods: A neighbor search heuristic algorithm obtains a solution by (1) randomly determining the mode, quality level, and assignment order for each activity. (2) get a solution by improving the solution by changing the possible modes and quality levels; (3) to find a solution by improving the solution from the point where it is feasible to advance the start time. Here, Case[1] is a method to find the optimal solution value after repeating (1). Case [2] is a method for finding a solution including (1) and (2). Case [3] refers to a method for finding solutions including (1), (2), and (3). Results: It can be seen that the value of the objective function presented by the algorithm changes depending on how the model of the heuristic algorithm is designed and applied. In other words, it suggests the importance of algorithm design and proves the importance of the quality problem of activities in the project schedule. Conclusion: A study significance of the optimization algorithm and the heuristic algorithm was applied to the effect of the quality of the preceding activity on the duration and cost of itself and the succeeding activity, which was not addressed in the project schedule problem.