• Title/Summary/Keyword: Lost

Search Result 3,736, Processing Time 0.035 seconds

The Lived Experiences of the Middle-Aged Women (중년 여성의 삶에 대한 경험)

  • Kim, Boon-Han;Kim, Yoon-Sook;Oh, Jin-Hwan;Jung, Eun-Sil
    • Korean Journal of Adult Nursing
    • /
    • v.17 no.4
    • /
    • pp.521-528
    • /
    • 2005
  • Purpose: This study was explored the experiences of the middle-aged women and tried to understand their lived experiences. Method: The data was collected from 9 participants living in Seoul from Sep. to Dec. 2003. Collection of data was by means of in-depth interviews. The analysis of the data was made the phenomenological analytic method suggested by Colaizzi(1978). Result: The 10 themes were extracted in this study ; sense of emptiness, repentance of one's past, decline of physical functions, lost one's youth, worry of children, thinking about future, importance of husband, importance of job, composure of mind, content with present life. Conclusion: Therefore, the helpful program should be developed and applied to extend positive lived experiences, and relieve or exclude negative lived experiences for the middle aged women.

  • PDF

The 2004 parliamentary election in Mongolia: Big surprises and small victories

  • Schafferer, Christian
    • Journal of Contemporary Eastern Asia
    • /
    • v.3 no.2
    • /
    • pp.1-6
    • /
    • 2004
  • On 27 June 2004, some one million voters went to the polls in Mongolia to elect 76 members of the Great State Hural, Mongolia's parliament. It was the fourth election held in Mongolia under the 1992 constitution. In the previous election, the former communist MPRP won a landslide, ousting the government of former democracy activists. Under the MPRP, Mongolia's economy performed extraordinary well. Surprisingly, the ruling Mongolian People's Revolutionary Party (MPRP) lost its two-thirds majority and half its parliamentarians in the 2004 election. But the Motherland Democracy Coalition (MDC), a coalition of Mongolia's most influential opposition parties, fell short of achieving a majority of its own. After the election, a grand coalition government was formed, paving the way for profound legal, social, and economic reforms.

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF

Recovery Methods in Main Memory DBMS

  • Kim, Jeong-Joon;Kang, Jeong-Jin;Lee, Ki-Young
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.26-29
    • /
    • 2012
  • Recently, to efficiently support the real-time requirements of RTLS( Real Time Location System) services, interest in the main memory DBMS is rising. In the main memory DBMS, because all data can be lost when the system failure happens, the recovery method is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery method to reduce disk I/O in the main memory DBMS. Therefore, In this paper, we analyzed existing log techniques and check point techniques and existing main memory DBMSs' recovery techniques for recovery techniques research for main memory DBMS.

A study on mathematical modeling by neural networks (신경회로망을 이용한 수학적 모델에 관한 연구)

  • 이영진;이권순
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.624-627
    • /
    • 1992
  • Mathematical modeling is majorly divided into three parts: the derivation of models, the fitting of models to data, and the simulation of data from models. This paper focuses on the parameter optimization which is necessary for the fitting of models to data. The method of simulated annealing(SA) is a technique that has recently attracted significant attention as suitable for optimization problem of very large scale. If the temperature is too high, then some of the structure created by the heuristic will be destroyed and unnecessary extra work will be done. If it is too low then solution is lost, similar to the case of a quenching cooling schedule in the SA phase. In this study, therfore, we propose a technique of determination of the starting temperature and cooling schedule for SA phase.

  • PDF

The Design of DWT Quantizer to Improve the H.263 (H-263 성능 개선을 위한 DWT 양자화기 설계)

  • 이용식;정상연;심우성;허도근
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.597-600
    • /
    • 1999
  • TMN5 used to test the performance of H.263 is a DCT-based H.263 which DCT is used as transform coding, but DWT is used instead of DCT and adaptive quantizer of being appropriate to DWT is designed in this paper while the structure of TMN5 is maintained. DWT-based H.263, which is proposed in this paper, is excellent in transplantation of the existing system and can improve frame rate by transmitting more Frame. Also, the average PSNR, objective quality of image, has been lost at degree of average 0.35㏈ in luminance signals, but has been improved over a average of 2㏈ in chrominance signals. Subjective quality of image has been improved as blocking effect, which has seriously occurred in DCT based H.263, is diminished. DWT-based H.263 can. therefore. advance video quality of image comparing with the existing ways.

  • PDF

A Study on the flow control for reliable IP multicast of the ATM network (ATM 망에서 신뢰성 있는 IP 멀티캐스트를 위한 흐름제어에 관한 연구)

  • 황기연;이광재;임형규
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.165-168
    • /
    • 2000
  • Since the IP multicast was proposed, there have been many research works on reliable multicast protocols[1]. In multicast communication, many reliable multicast schemes were studied in order to overcome packet losses in the network. However the fact that packets are lost in the underlying networks but the solutions are sought in the end hosts makes the search for solutions difficult. If routers can identify packets before dropped from congestion, the routers can initiate recovery process. recovery scheme by routers is proposed. This scheme is much faster than by sender-initiated or receiver-initiated recovery and latency is smaller.

  • PDF

Fallen Distance Measure of Vehicle Using Parabolic Motion (포물선 운동을 이용한 자동차의 떨어진 거리 측정)

  • Shin, Seong-Yoon;Pyo, Sung-Bae;Shin, Kwang-Seong;Lee, Hyun-Chang;Rhee, Yang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.63-64
    • /
    • 2011
  • 포물체란 중력이 작용하는 환경에서 어떤 속도로 던져진 물체를 뜻합니다. 예를 들자면, 박찬호 선수가 포수를 향하여 던진 야구공이라든지, 박세리 선수의 스윙으로 그린을 향하여 날아가고 있는 골프공, 그리고 목표물을 향하여 날아가고 있는 포탄은 모두 포물체입니다. 이 물체는 수직방향으로는 중력의 영향을 받고 공기의 저항을 무시한다면 수평방향으로는 힘을 받지 않기 때문에 포물선운동을 한다. 본 논문에서는 포물체의 운동을 이용하여 도로의 일부가 유실되어 없어진 곳을 실험 대상을 한다. 여기에서 속도가 일정하게 달리던 자동차가 유실된 도로의 가장자리를 넘어갔을 때 도로의 가장자리로에서 얼마나 멀리 가서 떨어지는지를 나타내었다.

  • PDF

Development of the Smart Belt System for Preventing Loss of Items using Beacon

  • Kim, MyeongSeon;Joo, JinHyeon;Park, GeunDuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.9-14
    • /
    • 2017
  • In this paper, we propose the smart belt system for preventing loss of items using Beacon. The proposed system monitors the distances of the registered items via the belt that is always worn. The belt determines the loss of the items by measuring the relative distance via RSSI (Received Signal Strength Indicator) value of the signals received from the BLE (Bluetoothl Low Energy) sensor, which is attached on the items such as bags and wallets. If the registered item is determined to be lost, the belt rings to remind the user of the loss. The missing status could be known to users through the smartphone application connected to the belt. The smartphone application communicates with the belt using Beacon, and provides users with a quick and easy way to check the status of their items.

Visual tracking based Discriminative Correlation Filter Using Target Separation and Detection

  • Lee, Jun-Haeng
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.55-61
    • /
    • 2017
  • In this paper, we propose a novel tracking method using target separation and detection that are based on discriminative correlation filter (DCF), which is studied a lot recently. 'Retainability' is one of the most important factor of tracking. There are some factors making retainability of tracking worse. Especially, fast movement and occlusion of a target frequently occur in image data, and when it happens, it would make target lost. As a result, the tracking cannot be retained. For maintaining a robust tracking, in this paper, separation of a target is used so that normal tracking is maintained even though some part of a target is occluded. The detection algorithm is executed and find new location of the target when the target gets out of tracking range due to occlusion of whole part of a target or fast movement speed of a target. A variety of experiments with various image data sets are conducted. The algorithm proposed in this paper showed better performance than other conventional algorithms when fast movement and occlusion of a target occur.