• Title/Summary/Keyword: Corruption Pattern

Search Result 10, Processing Time 0.017 seconds

Adolescents' Political Trust in Asian Societies: The Roles of Authoritarian Orientations and Corruption Perception (권위주의적 성향과 부패에 대한 인식이 아시아 청소년의 정치적 신뢰에 미치는 영향에 대한 연구)

  • Kim, Hyungryeol
    • Korean Journal of Comparative Education
    • /
    • v.28 no.2
    • /
    • pp.23-52
    • /
    • 2018
  • This study examines factors that influence adolescents' political trust in Asian societies with special emphases on authoritarian orientations and corruption perception. Previous studies on adolescents' political trust have focused almost exclusively on Western societies. As a result, the impact of other cultural values that are specific to Asian societies, such as authoritarian orientations, on adolescents' political trust has received little attention in the existing literature. Moreover, situated within a socialization framework which argues that political trust is an extension of interpersonal trust, much prior work has ignored the role of adolescent evaluations of institutional performance in generating political trust. The data I use offer empirical evidence that both authoritarian orientations and institutional performance-especially its ability to curb corruption-are independent sources of political trust among Asian adolescents and that the trust-eroding effect of corruption is less salient among Asian adolescents adopting more authoritarian orientations. Additionally, the evidence also suggests that corruption perception is a more important factor than authoritarian orientations in shaping adolescents' political trust in more economically developed countries while the reverse pattern is found in less developed countries.

Study on Pattern of Civil Service Crimes and Control Plan : Focused on the Prosecutor's Office and High ranking Public Officials Crime Investigation Office (공무원 범죄의 유형과 통제방안 -검찰과 고위 공직자범죄수사처를 중심으로)

  • Kim, Taek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.59-69
    • /
    • 2021
  • The Moon Jae-in administration insisted on reforming the prosecution for the reform of power institutions, and also tried to control the power of the prosecution through the establishment of a high-ranking public officials criminal investigation office. Then, what is the direction of the legal prosecution reform? Above all, it is a logic to drastically reduce the power of the prosecution. How to shrink it? First, it is necessary to control or check the power of prosecution and investigation that the prosecution has. Second, the key to the reform of the prosecution is perhaps to separate personnel rights from power. In order to exclude external pressure from the prosecution's personnel rights, there must be no instruction or intervention from the attorney general. To do this, the prosecutor general must go through various personnel evaluations, such as multi-faceted evaluation. Third, the essence of the High-ranking Officials Criminal Investigations Act is to deal with crimes of prosecutors, judges, police, and members of the National Assembly. It is also the core of the institutional mechanism to cover the corruption of one's family members while holding all the right to investigate, prosecution, and warrant claims, and to check the omnipresent prosecutors who have abused their right to investigate for political purposes. Then, what is necessary for the success of the high-ranking officials criminal investigation office? Above all, We think political neutrality is very necessary. The Ministry of Airborne has a very high authority of the Director. This paper intends to examine the functions and roles of the prosecution and high-ranking officials criminal investigation offices to prevent corruption. We analyzed the contents of the prosecution and the public officials criminal investigation office, and examined the limitations and problems, and the measures to control corruption in public offices.

The character classifier using circular mask dilation method (원형 마스크 팽창법에 의한 무자인식)

  • 박영석;최철용
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.913-916
    • /
    • 1998
  • In this paper, to provide the robustness of character recognition, we propose a recognition method using the dilated boundary curve feature which has the invariance characteristics for the shift, scale, and rotation changes of character pattern. And its some characteristics and effectieness are evaluated through the experiments for both the english alphabets and the numeral digits. The feature vector is represented by the fourier descriptor for a boundary curve of the dilated character pattern which is generated by the circular mask dilation method, and is used for a nearest neighbort classifier(NNC) or a nearest neighbor mean classifier(NNMC). These the processing time and the recognition rate, and take also the robustness of recognition for both some internal noise and partial corruption of an image pattern.

  • PDF

A FUZZY NEURAL NETWORK-BASED DECISION OF ROAD IMAGE QUALITY FOR THE EXTRACTION OF LANE-RELATED INFORMATION

  • YI U. K.;LEE J. W.;BAEK K. R.
    • International Journal of Automotive Technology
    • /
    • v.6 no.1
    • /
    • pp.53-63
    • /
    • 2005
  • We propose a fuzzy neural network (FNN) theory capable of deciding the quality of a road image prior to extracting lane-related information. The accuracy of lane-related information obtained by image processing depends on the quality of the raw images, which can be classified as good or bad according to how visible the lane marks on the images are. Enhancing the accuracy of the information by an image-processing algorithm is limited due to noise corruption which makes image processing difficult. The FNN, on the other hand, decides whether road images are good or bad with respect to the degree of noise corruption. A cumulative distribution function (CDF), a function of edge histogram, is utilized to extract input parameters from the FNN according to the fact that the shape of the CDF is deeply correlated to the road image quality. A suitability analysis shows that this deep correlation exists between the parameters and the image quality. The input pattern vector of the FNN consists of nine parameters in which eight parameters are from the CDF and one is from the intensity distribution of raw images. Experimental results showed that the proposed FNN system was quite successful. We carried out simulations with real images taken in various lighting and weather conditions, and obtained successful decision-making about $99\%$ of the time.

GPS/RTS data fusion to overcome signal deficiencies in certain bridge dynamic monitoring projects

  • Moschas, Fanis;Psimoulis, Panos A.;Stiros, Stathis C.
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.251-269
    • /
    • 2013
  • Measurement of deflections of certain bridges is usually hampered by corruption of the GPS signal by multipath associated with passing vehicles, resulting to unrealistically large apparent displacements. Field data from the Gorgopotamos train bridge in Greece and systematic experiments revealed that such bias is due to superimposition of two major effects, (i) changes in the geometry of satellites because of partial masking of certain satellites by the passing vehicles (this effect can be faced with solutions excluding satellites that get temporarily blocked by passing vehicles) and (ii) dynamic multipath caused from reflection of satellite signals on the passing trains, a high frequency multipath effect, different from the static multipath. Dynamic multipath seems to have rather irregular amplitude, depending on the geometry of measured satellites, but a typical pattern, mainly consisting of a baseline offset, wide base peaks correlating with the sequence of main reflective surfaces of the vehicles passing next to the antenna. In cases of limited corruption of GPS signal by dynamic multipath, corresponding to scale distortion of the short-period component of the GPS waveforms, we propose an algorithm which permits to reconstruct the waveform of bridge deflections using a weak fusion of GPS and RTS data, based on the complementary characteristics of the two instruments. By application of the proposed algorithm we managed to extract semi-static and dynamic displacements and oscillation frequencies of a historical railway bridge under train loading by using noisy GPS and RTS recordings. The combination of GPS and RTS is possible because these two sensors can be fully collocated and have complementary characteristics, with RTS and GPS focusing on the long- and short-period characteristics of the displacement, respectively.

Atrial Fibrillation Pattern Analysis based on Symbolization and Information Entropy (부호화와 정보 엔트로피에 기반한 심방세동 (Atrial Fibrillation: AF) 패턴 분석)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1047-1054
    • /
    • 2012
  • Atrial fibrillation (AF) is the most common arrhythmia encountered in clinical practice, and its risk increases with age. Conventionally, the way of detecting AF was the time·frequency domain analysis of RR variability. However, the detection of ECG signal is difficult because of the low amplitude of the P wave and the corruption by the noise. Also, the time·frequency domain analysis of RR variability has disadvantage to get the details of irregular RR interval rhythm. In this study, we describe an atrial fibrillation pattern analysis based on symbolization and information entropy. We transformed RR interval data into symbolic sequence through differential partition, analyzed RR interval pattern, quantified the complexity through Shannon entropy and detected atrial fibrillation. The detection algorithm was tested using the threshold between 10ms and 100ms on two databases, namely the MIT-BIH Atrial Fibrillation Database.

Tone Quality Improvement Algorithm using Intelligent Estimation of Noise Pattern (잡음 패턴의 지능적 추정을 통한 음질 개선 알고리즘)

  • Seo, Joung-Kook;Cha, Hyung-Tai
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.230-235
    • /
    • 2005
  • In this paper, we propose an algorithm that improves a tone quality of a noisy audio signal in order to enhance a performance of perceptual filter using intelligent estimation of noise pattern from a band degraded by additive noise. The proposed method doesn't use the estimated noise which is obtained from silent range. Instead new estimated noise according to the power of signal and effect of noise variation is considered for each frame. So the noisy audio signal is enhanced by the method which controls a estimation of noise Pattern effectively in a noise corruption band. To show the performance of the proposed algorithm, various input signals which had a different signal-to-noise ratio(SNR) such as $5\cal{dB},\;10\cal{dB},\;15\cal{dB}\;and\;20\cal{dB}$ were used to test the proposed algorithm. we carry out SSNR and NMR of objective measurement and MOS test of subjective measurement. An approximate improvement of $7.4\cal{dB},\;6.8\cal{dB},\;5.7\cal{dB},\;5.1\cal{dB}$ in SSNR and $15.7\cal{dB},\;15.5\cal{dB},\;15.2\cal{dB},\;14.8\cal{dB}$ in NMR is achieved with the input signals, respectively. And we confirm the enhancement of tone quality in terms of mean opinion score(MOS) test which is result of subjective measurement.

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.16 no.4
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

Empirical Analysis of Political Communication Mode at Cyberspace (사이버 공간에서의 정치 커뮤니케이션 양식 분석 연구 : 제16대 공선 후보자 사이버 게시판 분석을 중심으로)

  • Hwang, Geun
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.207-254
    • /
    • 2001
  • This study is focused on forecasting the future of tole-democracy. Many Scholars expect that internet provides technological space needing realizing the tole-democracy or deliberate democracy. Especially in Korea, this expectation is higher than other nations because of political corruption and inefficiency. Therefore internet is intended to considering as new technologies reforming political process. In 16th the general election period, many candidates established home page and used as election campaign tool. And a little of home pages is payed attention to among voters. In spite of using internet as political medium, many political communication researchers have a doubt that internet will realize ideal direct democracy. It's reason is that internet is open and anonymous space. At anonymous space, communication participators is tended to be irresponsible and non-serious. Therefore it is hard that cyber-politics will be ideal type of democracy. In this context, this paper analyzed how pauicipators communicate with others at cyber bulletin board establishing candidate's home pages. Main research questions is how do discussions at cyberspace fulfill the conditions of deliberate democracy. Therefore, concrete questions include; who are participators at candidate's cyber bulletin board; which pattern do they communicate; what is the theme of communication; which effects do the anonymous character of cyberspace influence. To that purpose, this study conducted content analysis on 4,210 written matters at 82 cyber bulletin boards of candidate's home page establishing during 16th the general election period. It can be found that cyberspace in Korea still is not deliberate democracy space and not will be. Firstly, discussion patterns at cyber bulletin board is "candidate with supporters communication space. To be exact, it is said that candidate's home page is "the space of self-convincing among supporters." Secondly, the main themes of discussion are simple emotional expressions; "I support you!" "fighting" "Be vigor" etc. By contrast, real political contents'-central or local political matters - is relatively few. In the mode of expression, real political messages are more positive, logical than simple expressions, candidates private matters. Especially this characteristic will make cyberspace as "mutual slander space" consolidating anonymous characteristic of cyberspace. finally, Cyberspace in Korea still is not real "public sphere" realizing deliberate process. Therefore to be real public sphere, it is needed to participant's ethical maturity and political citizenship. In conclusion, it is difficult that cyberspace will reconstruct the Athene's Agora. On the contrary, Cyberagora will like to be irrespectable area fulfilling the sweeping. Making the deliberate space, technological possibility and ethical condition will have to be balanced together.

  • PDF

An Analysis of Chinese Technology Billionaires (중국의 기술업 억만장자 분석)

  • Sun, Yunhao;Seol, Sung-Soo
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.4
    • /
    • pp.1577-1605
    • /
    • 2018
  • This study analyzes China's technology billionaires. However, this study does not show the accumulating process of wealth in each of the Chinese billionaires, because there are many technology billionaires, but only deals with the macro analysis of the technology billionaire; the pattern of existence, comparison with other industries, the process of wealth creation reflecting China's particularity, and comparison with the world's technology billionaires. The findings of this study are as follows. First, more than 10 billion yuan of Chinese billionaires will emerge from 2004. Second, in the early days, illegal and corruption made rich, but the wealth of own efforts has gradually increased. Third, the real estate and manufacturing billionaires are still strong overall, but the growth of billionaires in technology, medicine and finance industry is remarkable. Fourth, in the case of the top 10 richest, four are from real estate, four from technology, and two from manufacturing and distribution. Most technology billionaires are in Guangdong, Zhejiang, Beijing and Shanghai. The determinants of the number of billionaires are GDP, exchange rate to US Dollar and Shenzen Stock Index, and those of technology billionaire are GDP and exchange rate. Given the relationship with existing theories, this study can be called the fifth type of billionaire research. Conceptually, the main reason for accumulating wealth is the search for policy opportunities, market opportunities and technology opportunities.