• Title/Summary/Keyword: NICE

Search Result 348, Processing Time 0.024 seconds

GORENSTEIN FPn-INJECTIVE MODULES WITH RESPECT TO A SEMIDUALIZING BIMODULE

  • Zhiqiang Cheng;Guoqiang Zhao
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.1
    • /
    • pp.29-40
    • /
    • 2024
  • Let S and R be rings and SCR a semidualizing bimodule. We introduce the notion of GC-FPn-injective modules, which generalizes GC-FP-injective modules and GC-weak injective modules. The homological properties and the stability of GC-FPn-injective modules are investigated. When S is a left n-coherent ring, several nice properties and new Foxby equivalences relative to GC-FPn-injective modules are given.

A TECHNIQUE WITH DIMINISHING AND NON-SUMMABLE STEP-SIZE FOR MONOTONE INCLUSION PROBLEMS IN BANACH SPACES

  • Abubakar Adamu;Dilber Uzun Ozsahin;Abdulkarim Hassan Ibrahim;Pongsakorn Sunthrayuth
    • Nonlinear Functional Analysis and Applications
    • /
    • v.28 no.4
    • /
    • pp.1051-1067
    • /
    • 2023
  • In this paper, an algorithm for approximating zeros of sum of three monotone operators is introduced and its convergence properties are studied in the setting of 2-uniformly convex and uniformly smooth Banach spaces. Unlike the existing algorithms whose step-sizes usually depend on the knowledge of the operator norm or Lipschitz constant, a nice feature of the proposed algorithm is the fact that it requires only a diminishing and non-summable step-size to obtain strong convergence of the iterates to a solution of the problem. Finally, the proposed algorithm is implemented in the setting of a classical Banach space to support the theory established.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

Analyzing the effectiveness of public R&D subsidies on private R&D expenditure (정부보조금의 민간연구개발투자에 대한 효과분석)

  • Kim, Ho;Kim, Byung Keun
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.3
    • /
    • pp.649-674
    • /
    • 2012
  • The purpose of this study is to investigate the effects of public R&D subsidies on private R&D. We have analyzed rationales for the public R&D subsidy from different perspectives. On the basis of literature review, a two step research model is constructed: participation phase (when firms benefit from public subsidies) and decision phase (when firms make decision on additional R&D investments). Using propensity score matching(PSM) method, we compare the potential outcome of the treated group to a matched controlled group of non-subsidized firms. The data used in this paper was collected from various sources. The Korean Innovation Survey 2008(manufacturing sector) is a main source of data. Financial data such as revenue, asset and capital stock, and number of employees were supplemented from the Nice Information Service KIS Value database. The R&D survey, conducted by MEST(Ministry of Education, Science and Technology) each year, was also used for the R&D expenditures of the manufacturing firms. This study comes up with the following empirical results. First, a firm's innovation capability, financial constraints, and sector appear to influence the selection of firms who were benefited from government's financial supports for R&D. Second, empirical results show that public R&D funding complements private investment on average and appear to have perpetual effects on the following year. Finally, sectoral difference in the effect of public subsidies on firms' R&D investment was confirmed. In addition, SMEs show more positive effects than large firms.

  • PDF

An ROI Coding Technique of JPEG2000 Image Including Some Arbitrary ROI (임의의 ROI를 포함하는 JPEG2000 이미지의 ROI 코딩 기법)

  • Hong, Seok-Won;Kim, Sang-Bok;Seo, Yeong-Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.31-39
    • /
    • 2010
  • In some image processing system or the users who want to see a specific region of image simply, if a part of the image has higher quality than other regions, it would be a nice service. Specifically in mobile environments, preferential service was needed, as the screen size is small. So, JPEG2000 supplies this function. But this doesn't support the process to extract specific regions or service and does the functions to add some techniques. It is called by ROI(Region-of-Interest). In this paper, we use images including human faces, which are processed most preferentially and compressed with high quality. Before an image is served to the users, it is compressed and saved. Here, the face parts are compressed with higher quality than the background which are relatively with lower quality. This technique can offer better service with preferential transferring of the faces, too. Besides, whole regions of the image are compressed with same quality and after searching the faces, they can be preferentially transferred. In this paper, we use a face extraction approach based on neural network and the preferential processing with EBCOT of JPEG2000. For experimentation, we use images having several human faces and evaluate objectively and subjectively, and proved that this approach is a nice one.

Phenomenological Study on Husband's Role in Rural Multicultural Family (농촌 다문화가정 여성의 남편역할 인식과 경험에 대한 질적연구)

  • Cho, Hae Sun;Ryu, Jin A
    • Journal of Agricultural Extension & Community Development
    • /
    • v.20 no.1
    • /
    • pp.265-297
    • /
    • 2013
  • This study performed quality study to examine cognition and experience as it is about husband role of wife's perception in rural multicultural family. Specifically the results of in-depth interviews with 13 females in rural multicultural family was analyzed through phenomenological method. The results were as followings: first, wife's cognition about husband role in rural multicultural family, they were 'nice and warm man', 'no special thought', 'clean and cool looking man', 'man without straitening wife', 'husband taking care of housekeeping', 'having independent family' and 'strong responsibility to children'. Females in rural multicultural family did not deeply think about husband's role at international marriage, but it could be known that vague longing for rich country, Korea by Korean wave and its expectation continued to expectation on husband. Second, they were 'good-tempered and nice to me', 'adjust to me', 'irresponsibility and apathy', 'cannot lean to him', 'no housekeeping', 'intermediate role between his family', 'more taking care of children, parents and relatives', 'drink, gambling and violence'. The experience of husband role was little different from cognition of husband role by females in rural mulitcultural family.

Hybrid Blockchain Design to Improve the Security of Education Administration Information System (교육행정정보시스템의 보안성 강화를 위한 하이브리드 블록체인 설계)

  • Son, Ki-Bong;Son, Min-Young;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.1-11
    • /
    • 2021
  • The Neis System is a system integrating administrative information that was operated in elementary and secondary schools in Korea. Currently, this system is operated by a central server method and contains school administration information and important educational information of students. Among student information, the student life record contains important information for a student to advance to a higher level institution, but problems such as information leakage or manipulation may occur due to malicious attacks. In this paper, we propose a hybrid blockchain system that combines the server and blockchain technology managed by the existing Neis system. The proposed system records the query information of the database in a block when student information is accessed. When a request for correction of student information or issuance of a certificate is received, the query of the blockchain, the information in the database, and the student's key value are checked to determine whether the information has been leaked or manipulated, and only if the data is normal, the request for revision of the record is performed. This process is more secure than the existing central server because it checks the manipulation of data through the blockchain. The proposed system was implemented on the Ethereum platform, and the query information of the blockchain was experimentally verified using smart contracts. This study contributes to enhancing the reliability of the Nice system by strengthening the security against forgery and alteration of student data by combining the existing Nice system with a block chain.

Heterologous Expression of Interferon α-2b in Lactococcus lactis and its Biological Activity against Colorectal Cancer Cells

  • Meilina, Lita;Budiarti, Sri;Mustopa, Apon Zaenal;Darusman, Huda Shalahudin;Triratna, Lita;Nugraha, Muhammad Ajietuta;Bilhaq, Muhammad Sabiq;Ningrum, Ratih Asmana
    • Microbiology and Biotechnology Letters
    • /
    • v.49 no.1
    • /
    • pp.75-87
    • /
    • 2021
  • Type I Interferons (IFNα) are known for their role as biological anticancer agents owing to their cell-apoptosis inducing properties. Development of an appropriate, cost-effective host expression system is crucial for meeting the increasing demand for proteins. Therefore, this study aims to develop codon-optimized IFNα-2b in L. lactis NZ3900. These cells express extracellular protein using the NICE system and Usp45 signal peptide. To validate the mature form of the expressed protein, the recombinant IFNα-2b was screened in a human colorectal cancer cell line using the cytotoxicity assay. The IFNα-2b was successfully cloned into the pNZ8148 vector, thereby generating recombinant L. lactis pNZ8148-SPUsp45-IFNα-2b. The computational analysis of codon-optimized IFNα-2b revealed no mutation and amino acid changes; additionally, the codon-optimized IFNα-2b showed 100% similarity with native human IFNα-2b, in the BLAST analysis. The partial size exclusion chromatography (SEC) of extracellular protein yielded a 19 kDa protein, which was further confirmed by its positive binding to anti-IFNα-2b in the western blot analysis. The crude protein and SEC-purified partial fraction showed IC50 values of 33.22 ㎍/ml and 127.2 ㎍/ml, respectively, which indicated better activity than the metabolites of L. lactis NZ3900 (231.8 ㎍/ml). These values were also comparable with those of the regular anticancer drug tamoxifen (105.5 ㎍/ml). These results demonstrated L. lactis as a promising host system that functions by utilizing the pNZ8148 NICE system. Meanwhile, codon-optimized usage of the inserted gene increased the optimal protein expression levels, which could be beneficial for its large-scale production. Taken together, the recombinant L. lactis IFNα-2b is a potential alternative treatment for colorectal cancer. Furthermore, its activity was analyzed in the WiDr cell line, to assess its colorectal anticancer activities in vivo.

Heating of a coronal loop by the evolution of the fine-scale magnetic discontinuity in the photosphere

  • Song, Donguk;Chae, Jongchul;Park, Soyoung;Ahn, Kwangsu;Cao, Wenda
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.84.3-85
    • /
    • 2015
  • We report a small-scale EUV bright loop associated with the evolution of the fine-scale magnetic discontinuity in the photosphere. Our analysis was carried out by using the high spatial resolution data taken with InfraRed Imaging Magnetograph (IRIM) and the Fast Imaging Solar Spectrograph (FISS). As a result, an extremely narrow dark lane of the intense horizontal magnetic field (width ~ 300 km) is detected parallel to the boundary of the magnetic pore, which is one of the footpoints of the small-scale bright coronal loop. We find that the variation of the net linear polarization inside the dark lane is closely related to the intensity variations of the coronal loop. Based on our results, we suggest that small-scale atmospheric heating such as bright coronal loop seen above the complex pore group may be strongly affected by the evolution of the fine-scale magnetic discontinuity in the photosphere. This is a nice example of solar atmospheric heatings associated with the fine-scale magnetic discontinuity in the photosphere.

  • PDF

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.