• Title/Summary/Keyword: Copying

Search Result 305, Processing Time 0.025 seconds

Reengineering methodologies of low-cost manufacturing systems in Korean companies (저비용 생산시스템의 구축을 위한 리엔지니어링 방법론)

  • 유인선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.19 no.39
    • /
    • pp.143-154
    • /
    • 1996
  • Manufacturing industry is on the verge of a major paradigm shift. This shift will take us away from mass production, way beyond lean manufacturing into a world of new intelligent and agile manufacturing. We spent most of our time during the 1980s copying the Japanese. This paper studys reengineering methodologies to build up low-cost manufacturing systems efficiently in Korean companies

  • PDF

Using Answer-Separated Encoder And Copying Mechanism (정답 분리 인코더와 복사 메커니즘을 이용한 한국어 질문 생성)

  • Kim, Geon-Yeong;Lee, Chang-Ki
    • Annual Conference on Human and Language Technology
    • /
    • 2019.10a
    • /
    • pp.419-423
    • /
    • 2019
  • 질문과 그에 대한 근거가 있는 문서를 읽고 정답을 예측하는 기계 독해 연구가 최근 활발하게 연구되고 있다. 기계 독해 문제를 위해 주로 사용되는 방법은 다층의 신경망으로 구성된 딥러닝 모델로 좋은 성능을 위해서는 양질의 대용량 학습 데이터가 필요하다. 그러나 질과 양을 동시에 만족하는 학습 데이터를 구축하는 작업에는 많은 경제적 비용이 소모된다. 이러한 문제를 해결하기 위해, 본 논문에서는 정답 분리 인코더와 복사 메커니즘을 이용한 단답 기반 한국어 질문 자동 생성 모델을 제안한다.

  • PDF

A Design of IFFT Processor for Reducing OFDM Transmitter Latency (OFDM 송신단의 지연을 줄이기 위한 IFFT Processor의 설계)

  • Kim, Jun-Woo;Park, Youn-Ok;Kim, Whan-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12C
    • /
    • pp.1167-1176
    • /
    • 2009
  • In This Paper, we introduce an efficient IFFT design technique named for transmitter of OFDM (Orthogonal Frequency Division Multiplexing) system. In OFDM system, a cyclic prefix is inserted in forepart of OFDM symbol to prevent ICI(Inter-channel Interference) and ISI (Inter-symbol Interference). Attaching cyclic prefix causes delay in storing and copying IFFT result. The proposed IFFT removes this delay because its output is cyclic shifted by the length of cyclic prefix. So we can make a complete OFDM symbol by just copying the forepart of IFFT output to the end. In many cases, the length of cyclic prefix is 1/2n of FFT size, and this IFFT does not require additional hardware complexity and it does not cause any performance degradation.

Orbital Wall Reconstruction by Copying a Template (defect model) from the Facial CT in Blow-out Fracture (얼굴뼈 CT 계측 모형을 이용한 안와벽골절의 재건)

  • Kim, Jae Keun;You, Sun Hye;Hwang, Kun;Hwang, Jin Hee
    • Archives of Craniofacial Surgery
    • /
    • v.10 no.2
    • /
    • pp.71-75
    • /
    • 2009
  • Purpose: Recently, orbital wall fracture is common injuries in the face. Facial CT is essential for the accurate diagnosis and appropriate treatment to reconstruct of the orbital wall. The objective of this study was to report the method for accurate measurement of area and shape of the bony defect in the blow-out fractures using facial CT in prior to surgery. Methods: The authors experienced 46 cases of orbital wall fractures and examined for diplopia, sensory disturbance in the area of distribution of the infraorbital nerve, and enophthalmos in the preoperation and followed 1 months after surgery, from August 2007 to May 2008. Bony defect was predicted by measuring continuous defect size from 3 mm interval facial CT. Copying from the defect model (template), we reconstructed orbital wall with resorbable sheet (Inion $CPS^{(R)}$ Inion Oy, Tampere, Finland). Results: One months after surgery using this method, 26 (100%) of the 26 patients improved in the diplopia and sensory disturbance in the area of distribution of the infraorbital nerve. Also 8 (72.7%) of the 11 patients had enophthalmos took favorable turn. Conclusion: This accurate and time-saving method is practicable for determining the location, shape and size of the bony defect. Using this method, we can reconstruct orbital wall fracture fastly and precisely.

A Study on the Role Conflict and Ways of Coping of Underwriters Worked at Life Insurance Companies in Korea (생명보험계약심사간호사의 역할갈등에 따른 대처방법에 관한 연구)

  • Choi, Im-Kue;Koh, Myung-Suk
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.9 no.4
    • /
    • pp.615-624
    • /
    • 2003
  • Purpose: The purpose of this study was to find out the role conflict and ways of copying of nurses as underwriters worked at life insurance companies in Korea. Method: The subjects were 141 underwriters who were working at 4 major life insurance companies in Korea. For finding the role conflicts, Role conflict and Ambiguity scale developed by Rizzo, House & Lirtzman(1970) was used, For the ways of coping, Ways of coping scale developed by Lazarus et al. (1984) was used. The statistical method used were mean, percentage, t-test, ANOVA and Turkey test by SAS program. Result: The mean of role conflict was 2.76, and its subcategories were intersender conflict 2.95, sequential order interrole conflict 3.13, interarole conflict 2.69, organizational conflict 2.69, ambiguity from the outcome or responses to one's behavior 2.60, ambiguity from clarity of behavior requirements 2.61. The mean of ways of coping was 2.42 and its subcategories were problem focused 2.42, wishful thinking 2.26, detachment 2.09, seeking social support 2.49, focusing positive 2.72, tension reduction 2.08. There is statistically significant difference between single and married person i.e, single was high than married about role conflict. And also there is statistically significant difference among religion groups i.e., christian was high than none about ways of copying. Conclusion: The results of this study suggest that nurses as underwriters' role conflicts and ways of coping were different that of clinical nurses' and examining medical insurance nurses', Therefore it need more detail repeat studies.

  • PDF

Design of Pretreatment Process in Cellulosic Ethanol Production (목질계 셀룰로오스 에탄올 생산공정에서 전처리과정의 설계)

  • Kim, Hyungjin;Lee, Seung Bum
    • Applied Chemistry for Engineering
    • /
    • v.26 no.4
    • /
    • pp.511-514
    • /
    • 2015
  • A pretreatment process of cellulose decomposition to a monosaccharide plays an important role in the cellulosic ethanol production using the lignocellulosic biomass. In this study, a cellulosic ethanol was produced by using acidic hydrolysis and enzymatic saccharification process from the lignocellulosic biomass such as rice straw, sawdust, copying paper and newspaper. Three different pretreatment processes were compared; the acidic hydrolysis ($100^{\circ}C$, 1 h) using 10~30 wt% of sulfuric acid, the enzymatic saccharification (30 min) using celluclast ($55^{\circ}C$, pH = 5.0), AMG ($60^{\circ}C$, pH = 4.5), and spirizyme ($60^{\circ}C$, pH = 4.2) and also the hybrid process (enzymatic saccharification after acidic hydrolysis). The yield of cellulosic ethanol conversion with those pretreatment processes were obtained as the following order : hybrid process > acidic hydrolysis > enzymatic saccharification. The optimum fermentation time was proven to be two days in this work. The yield of cellulosic ethanol conversion using celluclast after the acidic hydrolysis with 20 wt% sulfuric acid were obtained as the following order : sawdust > rice straw > copying paper > newspaper when conducting enzymatic saccharification.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

Factors of Variation in Diagrams and Location of Kidney (신장도(腎臟圖)의 형태요소와 그 변이(變異)에 대한 연구)

  • Jo, Hak-Jun
    • The Journal of Korean Medical History
    • /
    • v.31 no.1
    • /
    • pp.23-42
    • /
    • 2018
  • This study examines the variation in diagrams of the kidney, and the effects on location of the Life Gate as a result. My study analyzes diagrams of kidney form and location, such as appearance, the vertebral spine, ShenXi, and "Life Gate", and also explores the causes for such variations. The kidney is commonly described as having the shape of a bean, which throughout medical history has showed almost no variation. The spine was initially described with a total of 21 vertebrae, and later with a range of 19-25 vertebrae. Regarding the height of kidney in relationship to the spine, it was initially described as beginning at the 14th vertebrae, and later changed to the 15th or 17th vertebrae. However, there have been no changes in the perception of the height of kidney. Initially, the location of the Life Gate could not be identified. Three different suggestions of its location were found throughout historical literature, including: (1) at or within the right kidney; (2) between two kidneys; and (3) between 14th-15th spine. There were also variations noted in the process of copying diagrams of kidney in many books not only because the work of copying was not precise, but also because each medical practitioner had a different interpretation of the kidney's form and function in Traditional Korean and Chinese Medicine. It appears that some practitioners may have been influenced by their understandings of theory of Life Gate.

DRM System using Gstreamer based on DMP (DMP 기반의 Gstreamer를 이용한 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.611-614
    • /
    • 2007
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. Despite attempts to regulate DRM systems, including the MPEG group's Intellectual Property Management and Protection" system, the system is still struggling to maintain some sort of interoperability between differing protocols. In this paper, we designed and implemented a DRM system with Gstreamer, following the DMP.

  • PDF