• 제목/요약/키워드: Check-List

검색결과 394건 처리시간 0.021초

의치용 수지의 온성온도가 강도에 미치는 영향 (EFFECT OF THE CURING TEMPERATURE OF DENTURE RESINS ON THE STRENGTH)

  • 선우양국
    • 대한치과의사협회지
    • /
    • 제16권3호통권106호
    • /
    • pp.235-237
    • /
    • 1978
  • Dr. Walter Wright first presented the results of his studies on acrylic resins in July, 1937. The use of resins for adaptation in inlay and crown and bridge prosthesis was first reported in June 1940 by Harris. There has been now and acceptable list of several physical and mechanical properties of acrylic resins which have been studied to a considerable extent by various researchers, or determined from clinical experience. They include; pleasant esthetics, taste, odor, cleanliness, compatibility with oral tissue, dimensional stability, water sorption by imbibition, hardness, ease and success of repair, weight, thermal coefficient of expansion and strength to resist functional stress. The author carried a series of experiments forward to check the strength. Specimens which were cured at boiling temperature showed weaker strength than those ones which were cured at 72℃.

  • PDF

모빌 디바이스의 무선데이터통신을 활용한 엑스트라넷 구축연구 (A Study on construction of extranet using wireless data communication of mobile device)

  • 유우식
    • 산업경영시스템학회지
    • /
    • 제22권51호
    • /
    • pp.139-149
    • /
    • 1999
  • Developed in this paper is a prototype extranet using mobile device such as Personal Digital Assistance(PDA) or Handheld PC(HPC). Especially an adjustment transaction system for auto insurance using wireless data communications is described. Using infrastructures such as PCS, Cellular, Private Radio, wireless communications offers tremendous applications in Korea. A survey of such applications is presented in this paper. Also an analysis of currently available infrastructures of wireless communications is described in this paper. The scheme of an adjustment transaction consists of seven steps: (1) get list of adjustment, (2) obtain insurance information, (3) check police record, (4) get an accident record, (5) get bluebook value, (6) examine the car, (7) file report. Comparing with the previous on-line method that spends much time on gathering data, the proposed system guarantees more rapid transaction using wireless communications.

  • PDF

강의평가제에 관한 사례연구 -학생대상 설문조사에 근거한 교수 강의평가제 중심으로- (- A case study & suggestion for Lecture Evaluation System of University -)

  • 유지철;김용범;서장훈
    • 대한안전경영과학회지
    • /
    • 제5권2호
    • /
    • pp.239-253
    • /
    • 2003
  • Lecture Evaluation system is an only way, so far, to evaluate the quality of lectures in our university and yet has several problems. This system does not have any effects on professors; however, it is rather used to threaten assistant professors and/or part-time/full-time lecturers. As a result, students are still dissatisfied with the unchanging lectures of professors. Generally speaking, We should consider new ideas to introduce a head teacher system or improve the lecture evaluation system to open doors wider for teachers, professors do their best to expand students' understanding by practicing the Lecture Evaluation System. In fact, it is hard to keep the objectiveness that the professors estimate the quality of professors. That is why this check list should be restricted only as a guideline among the system. After all, it is expected to bring better educational circumstances when the system functions properly to provide professors to research more.

Design and Implementation of the Authentication System for In-app Billing in Mobile Environments

  • Seok, Ho-Jun;Kim, Seog-Gyu
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권2호
    • /
    • pp.61-69
    • /
    • 2016
  • In this paper, we propose the authentication server system that prevent hacking in In-app billing applications. And we also propose the methods to verify electronic receipt for the payment of internal app payments and to check the integrity of the applications. Then we designed the payment metabolic system that checks between products-offer list and paid subscription if payment system is hacked with new hacking technologies different from existing ones. And then we implemented proposed authentication system and experimented with about 10,000 average internal application payments per an hour. It shows that proposed system has defensive techniques that counter attacks against in-app billing but it takes more than 0.8916 seconds than no-certification system that is considered as relatively short time.

군 정비창 입지선정 사례 (A Case Study on Decision Making of Location for Army Repair Shop)

  • 이재권
    • 산업경영시스템학회지
    • /
    • 제22권50호
    • /
    • pp.257-266
    • /
    • 1999
  • The objective of this study is to suggest DARE (Decision Alternative Ratio Evaluation) Method, which is usually using in VE(Value Engineering), as one of the evaluating alternatives techniques, especially deciding location. The process of solving location problem consists of 4 stages which are Data gathering and Confirming check list, Design of evaluating methodology, Evaluating, and Conclusion. In second stage which is the most important one among those, DARE method is adopted to solve location problem as a objective and scientific technique. The members who are participated workshop extremely agree to whole procedure of methodology and also their own conclusion through Workshop. This case study shows DARE method fits with select optimal location.

  • PDF

개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구 (A Study on the Information System Security Audit Method for Personal Information Protection)

  • 이동녘;박정선
    • 대한안전경영과학회지
    • /
    • 제12권4호
    • /
    • pp.107-116
    • /
    • 2010
  • To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.

분석단계에서의 소프트웨어 품질 평가에 관한 연구 (A Study on Software Quality Evaluation in Analysis Phase)

  • 장영숙;권영식
    • 산업경영시스템학회지
    • /
    • 제22권52호
    • /
    • pp.261-273
    • /
    • 1999
  • It is booming to use computer and information owing to the information society. Therefore, software demand is increasing rapidly. Enhancing utility value depends upon software quality. Software quality measurement and evaluation are necessary to satisfy the users who are using computers. In the present time, ISO/IEC 9126 define 6 quality characteristics and 21 sub-characteristics including 40 inter quality characteristics. We developed software evaluation technique using the check list in accordance with the ISO/IEC 9126 in analysis phase. We evaluated the software quality in order to verify developing technique at S college. As a result of the evaluation, this college has found it necessary to maintain the software as soon as possible because academic systems are not adequate for users at this present time.

  • PDF

주의력결핍 및 과잉행동장애 아동의 모-자녀 상호작용 놀이평가와 비행성향행동과의 관계 : 관찰연구 (The Relationship Between Mother-Child Interaction Play Assessment of Children with Attention Deficit Hyperactivity Disorder and Delinquency-Oriented Behavior : Observational Study)

  • 오미경
    • 아동학회지
    • /
    • 제25권3호
    • /
    • pp.59-74
    • /
    • 2004
  • The purpose of the this study was to examine the relationship between mother-child interaction play assessment of children with Attention Deficit Hyperactivity Disorder(ADHD) and delinquency through observational method. The subjects were 30children(normal: 15, ADHD: 15) between 4-6 elementary school grade. Instruments used Parent-Child Interaction Assessment(P-CIPA), Inventory of Delinquency-Oriented Behavior and Korea Children Behavior Check List(K-CBCL). Results showed that following : 1) ADHD affect the delinquency-oriented behavior; 2) there were significant differences in mother-child interaction play assessment between normal children group and ADHD children group; and 3) there was a significant relationship between parent-child interaction play assessment and delinquency.

  • PDF

우리나라에 출현하는 두족류 이름 (Korean Name of Cephalopods in Korea)

  • 김영혜;전영열
    • 한국패류학회지
    • /
    • 제26권2호
    • /
    • pp.171-175
    • /
    • 2010
  • 두족류의 우리말 사용에 따른 혼란을 해결하고, 한국산 두족류 총 목록 작성의 예비연구로써 이미 국내에 보고된 분류군의 우리말 이름을 수집 조사하였다. 우리말 이름을 가진 두족류의 어원과 조사 결과 나타난 문제점을 제시하고, 우리말 통일 작업이나 제정에 필요한 원칙을 제언하였다. 제언을 토대로 갑오징어목 2고 14종, 오징어목 7과 17종, 문어목 3과 7종에 대한 우리말 이름을 재정립하였다.

Recent Successive Cancellation Decoding Methods for Polar Codes

  • Choi, Soyeon;Lee, Youngjoo;Yoo, Hoyoung
    • Journal of Semiconductor Engineering
    • /
    • 제1권2호
    • /
    • pp.74-80
    • /
    • 2020
  • Due to its superior error correcting performance with affordable hardware complexity, the Polar code becomes one of the most important error correction codes (ECCs) and now intensively examined to check its applicability in various fields. However, Successive Cancellation (SC) decoding that brings the advanced Successive Cancellation List (SCL) decoding suffers from the long latency due to the nature of serial processing limiting the practical implementation. To mitigate this problem, many decoding architectures, mainly divided into pruning and parallel decoding, are presented in previous manuscripts. In this paper, we compare the recent SC decoding architectures and analyze them using a tree structure.