• 제목/요약/키워드: Non-Memory Strategy

검색결과 25건 처리시간 0.022초

여성노인의 우울유무에 따른 메타기억 및 기억수행의 차이 (A Relationship between Depression and The metamemory and Memory Performance in Elderly Women)

  • 민혜숙
    • 재활간호학회지
    • /
    • 제5권2호
    • /
    • pp.145-155
    • /
    • 2002
  • Purpose: This study tries to analyze the differences of memory performance and the metamemory of the elderly women according to degree of depression. And also it attempts to find the correlations among the sub-concepts of metamemory which have close relationships to the memory performance followed by the depression. Methods: The subjects of this study are 60 the elderly women who are older than sixty years in Busan city, Korea. We use the MIA(Dixon, et al., 1988) to measure metamemory and measure the memory performances such as the immeadiate word recall, the delayed word recall, the word recognition task, and face recognition. Results: 1. The average point of deprssed elderly womens' metamemory was significantly lower than non-depressed womens' point(t=10.86 p<.0017). Looking into subconcept of metamemory, depressed elderly womens' strategy, capacity, change, achievement point were significantly lower than non-depressed women. 2. In terms of immediate word recall and delayed word recall performances, depressed elderly women are significantly lower than non-depressed elderly women. 3. The degree of depressed elderly womens' metamemory(strategy, achievement, change, capacity) has significant correlations with immediate word recall performances. Conclusion: Metamemory has close relationship with the memory performance of elderly women. And also depressed elderly's sub-concepts of metamemory which have influences on their memory performance are different from non-depressed elderly's sub-concepts. Therefore, when we try to develop some programs to prevent memory decrease of elderly women, we should take these point into consideration.

  • PDF

비메모리 반도체 기술과 사업전개 방향 (Non-memory technology and it's business strategy)

  • 김석기
    • E2M - 전기 전자와 첨단 소재
    • /
    • 제8권2호
    • /
    • pp.237-241
    • /
    • 1995
  • 반도체 사업의 영역을 어떻게 분류하느냐에 따라 다르겠으나, 우리나라가 메모리 분야에서는 세계의 선진회사와 어깨를 나란히 한다는 점에서 메모리분야와 비메모리분야를 분류해 보고, 특히 비메모리분야의 기술동향과 이 분야에서의 우리나라 반도체 업체들의 사업전개 방향에 대해 방향을 제시해 보고자 한다. 메모리는 국내업체가 세계시장의 30%이상을 공급하고 있고, 256메가디램등 메모리분야에서 최첨단 제품의 개발이 속속 발표되고 있다. 반면에 그의 반도체 (비메모리분야)의 경우는 세계시장의 수 퍼센트도 공급하지 못하는 실정으로 반도체의 75% 가량을 차지하는 이 시장의 진입을 위해 장단기 계획을 수립하여 적극적으로 추진해야 할 것이다. 이 논문에서는 반도체 기술의 현재 상황을 국내외로 비교검토하고 우리나라와 기업의 발전방향을 제시해 보고자 한다.

  • PDF

A "Prime and Deploy" Strategy for Universal Influenza Vaccine Targeting Nucleoprotein Induces Lung-Resident Memory CD8 T cells

  • Haerynn Chung;Eun-Ah Kim;Jun Chang
    • IMMUNE NETWORK
    • /
    • 제21권4호
    • /
    • pp.28.1-28.14
    • /
    • 2021
  • Lung-resident memory T cells (TRM) play an essential role in protecting against pulmonary virus infection. Parenteral administration of DNA vaccine is generally not sufficient to induce lung CD8 TRM cells. This study investigates whether intramuscularly administered DNA vaccine expressing the nucleoprotein (NP) induces lung TRM cells and protects against the influenza B virus. The results show that DNA vaccination poorly generates lung TRM cells and massive secondary effector CD8 T cells entering the lungs after challenge infection do not offer sufficient protection. Nonetheless, intranasal administration of non-replicating adenovirus vector expressing no Ag following priming DNA vaccination deploys NP-specific CD8 TRM cells in the lungs, which subsequently offers complete protection. This novel 'prime and deploy' strategy could be a promising regimen for a universal influenza vaccine targeting the conserved NP Ag.

F-Tree : 휴대용 정보기기를 위한 플래시 메모리 기반 색인 기법 (F-Tree : Flash Memory based Indexing Scheme for Portable Information Devices)

  • 변시우
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.257-271
    • /
    • 2006
  • Recently, flash memories are one of best media to support portable computer's storages in mobile computing environment. The features of non-volatility, low power consumption, and fast access time for read operations are sufficient grounds to support flash memory as major database storage components of portable computers. However, we need to improve traditional Indexing scheme such as B-Tree due to the relatively slow characteristics of flash operation as compared to RAM memory. In order to achieve this goal, we devise a new indexing scheme called F-Tree. F-Tree improves tree operation performance by compressing pointers and keys in tree nodes and rewriting the nodes without a slow erase operation in node insert/delete processes. Based on the results of the performance evaluation, we conclude that F-Tree indexing scheme outperforms the traditional indexing scheme.

  • PDF

침대에서 동작 식별을 위한 비침습식 센서 시스템의 구현 (Implementation of a Non-Invasive Sensor System for Differentiating Human Motions on a Bed)

  • 조승호
    • 한국컴퓨터정보학회논문지
    • /
    • 제19권2호
    • /
    • pp.39-48
    • /
    • 2014
  • 본 논문에서는 아무런 불편함이 없이 사람이 하루 중 가장 많은 시간을 보내는 침대에서 사람 동작의 관찰을 가능하게 하는 비침습식 센서 시스템을 제안한다. 제안된 센서 시스템은 얇고 넓은 필름 형태의 압전센서, 신호처리 보드, 그리고 데이터 수집 프로그램으로 구성된다. 사람 동작에 따라 힘이 가해진 압전 센서는 전압 신호를 생성하게 되고, 이 신호는 제안 시스템에 의해 수집, 전처리, 변환된다. 최종 단계에서 FFT 결과는 k-NN 분류기에 의해 식별된다. 침대에서 10,000개 사람 동작을 식별하는 실험을 수행하였고, 약 89.4%의 정인식률을 달성하였다. 실험 결과는 제안된 시스템이 침대를 사용하는 사람이 정상인인지 중풍환자인지 식별할 능력이 있음을 시사한다. 본 논문의 성과는 침대 사용자의 동작을 지속적으로 관찰 가능하게 한다는 점이다. 이러한 지속적인 관찰은 동작 또는 수면 패턴에서 건강상 이상 징후를 탐지하는데 매우 유용하게 활용될 것이다.

휴대용 정보기기를 위한 플래시 기반 2단계 로킹 기법 (Flash-Based Two Phase Locking Scheme for Portable Computing Devices)

  • 변시우;노창배;정명희
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.59-70
    • /
    • 2005
  • Flash memories are one of best media to support portable computer's storages in mobile computing environment. The features of non-volatility, low power consumption, and fast access time for read operations are sufficient grounds to support flash memory as major database storage components of portable computers. However, we need to improve traditional transaction management scheme due to the relatively slow characteristics of flash operation as compared to RAM memory. in order to achieve this goal, we devise a new scheme called Flash Two Phase Locking (F2PL) scheme for efficient transaction processing. F2Pl improves transaction performance by allowing multi version reads and efficiently handling slow flash write/erase operation in lock management process. We also propose a simulation model to show the performance of F2PL. Based on the results of the performance evaluation, we conclude that F2PL scheme outperforms the traditional scheme.

  • PDF

Heritage Soft Power in East Asia's Memory Contests: Promoting and Objecting to Dissonant Heritage in UNESCO

  • Nakano, Ryoko
    • Journal of Contemporary Eastern Asia
    • /
    • 제17권1호
    • /
    • pp.50-67
    • /
    • 2018
  • Heritage has entered the center stage of public diplomacy in East Asia. Competition to claim and interpret memories of World War II in East Asia has driven campaigns to list heritage items with UNESCO. State and non-state actors aim to use heritage listings to present a particular view of the war and related history to domestic and international audiences. This paper highlights the role of heritage soft power in East Asia's "memory contests" by examining the promotion of dissonant modern heritage in UNESCO's heritage programs. It conceptualizes heritage designation as a soft power resource in East Asia and presents a conceptual framework for understanding the hegemonic competition over the "memory regime" that emerged from the structural change in East Asia's regional order. It then uses this framework to analyze the processes by which state and non-state actors promote and/or object to UNESCO recognition of their sites and documents as heritage of outstanding universal value or world significance. The elements of this process are illustrated with case studies of two very different pieces of heritage, Japan's "Sites of the Meiji Industrial Revolution" and China's "Documents of Nanjing Massacre," which were enshrined as significant world heritage in 2015. While state and non-state actors in East Asia are increasingly recognizing the utility of heritage as a soft power resource for advancing specific historical narratives to an international audience, a backlash movement from civil society groups and governments in other countries prevents a purely unilateral interpretation. As a result, the utility of heritage soft power in this context must be significantly qualified.

조직의 정보 니즈와 ERP 기능과의 불일치 및 그 대응책에 대한 이해: 조직 메모리 이론을 바탕으로 (Understanding the Mismatch between ERP and Organizational Information Needs and Its Responses: A Study based on Organizational Memory Theory)

  • 정승렬;배억호
    • Asia pacific journal of information systems
    • /
    • 제22권2호
    • /
    • pp.21-38
    • /
    • 2012
  • Until recently, successful implementation of ERP systems has been a popular topic among ERP researchers, who have attempted to identify its various contributing factors. None of these efforts, however, explicitly recognize the need to identify disparities that can exist between organizational information requirements and ERP systems. Since ERP systems are in fact "packages" -that is, software programs developed by independent software vendors for sale to organizations that use them-they are designed to meet the general needs of numerous organizations, rather than the unique needs of a particular organization, as is the case with custom-developed software. By adopting standard packages, organizations can substantially reduce many of the potential implementation risks commonly associated with custom-developed software. However, it is also true that the nature of the package itself could be a risk factor as the features and functions of the ERP systems may not completely comply with a particular organization's informational requirements. In this study, based on the organizational memory mismatch perspective that was derived from organizational memory theory and cognitive dissonance theory, we define the nature of disparities, which we call "mismatches," and propose that the mismatch between organizational information requirements and ERP systems is one of the primary determinants in the successful implementation of ERP systems. Furthermore, we suggest that customization efforts as a coping strategy for mismatches can play a significant role in increasing the possibilities of success. In order to examine the contention we propose in this study, we employed a survey-based field study of ERP project team members, resulting in a total of 77 responses. The results of this study show that, as anticipated from the organizational memory mismatch perspective, the mismatch between organizational information requirements and ERP systems makes a significantly negative impact on the implementation success of ERP systems. This finding confirms our hypothesis that the more mismatch there is, the more difficult successful ERP implementation is, and thus requires more attention to be drawn to mismatch as a major failure source in ERP implementation. This study also found that as a coping strategy on mismatch, the effects of customization are significant. In other words, utilizing the appropriate customization method could lead to the implementation success of ERP systems. This is somewhat interesting because it runs counter to the argument of some literature and ERP vendors that minimized customization (or even the lack thereof) is required for successful ERP implementation. In many ERP projects, there is a tendency among ERP developers to adopt default ERP functions without any customization, adhering to the slogan of "the introduction of best practices." However, this study asserts that we cannot expect successful implementation if we don't attempt to customize ERP systems when mismatches exist. For a more detailed analysis, we identified three types of mismatches-Non-ERP, Non-Procedure, and Hybrid. Among these, only Non-ERP mismatches (a situation in which ERP systems cannot support the existing information needs that are currently fulfilled) were found to have a direct influence on the implementation of ERP systems. Neither Non-Procedure nor Hybrid mismatches were found to have significant impact in the ERP context. These findings provide meaningful insights since they could serve as the basis for discussing how the ERP implementation process should be defined and what activities should be included in the implementation process. They show that ERP developers may not want to include organizational (or business processes) changes in the implementation process, suggesting that doing so could lead to failed implementation. And in fact, this suggestion eventually turned out to be true when we found that the application of process customization led to higher possibilities of failure. From these discussions, we are convinced that Non-ERP is the only type of mismatch we need to focus on during the implementation process, implying that organizational changes must be made before, rather than during, the implementation process. Finally, this study found that among the various customization approaches, bolt-on development methods in particular seemed to have significantly positive effects. Interestingly again, this finding is not in the same line of thought as that of the vendors in the ERP industry. The vendors' recommendations are to apply as many best practices as possible, thereby resulting in the minimization of customization and utilization of bolt-on development methods. They particularly advise against changing the source code and rather recommend employing, when necessary, the method of programming additional software code using the computer language of the vendor. As previously stated, however, our study found active customization, especially bolt-on development methods, to have positive effects on ERP, and found source code changes in particular to have the most significant effects. Moreover, our study found programming additional software to be ineffective, suggesting there is much difference between ERP developers and vendors in viewpoints and strategies toward ERP customization. In summary, mismatches are inherent in the ERP implementation context and play an important role in determining its success. Considering the significance of mismatches, this study proposes a new model for successful ERP implementation, developed from the organizational memory mismatch perspective, and provides many insights by empirically confirming the model's usefulness.

  • PDF

Possibility of Chaotic Motion in the R&D Activities in Korea

  • Loh, Jeunghwee
    • Journal of Information Technology Applications and Management
    • /
    • 제21권3호
    • /
    • pp.1-17
    • /
    • 2014
  • In this study, various characteristics of R&D related economic variables were studied to analyze complexity of science and technology activities in Korea, as reliance of R&D activities of the private sector is growing by the day. In comparison to other countries, this means that it is likely to be fluctuated by economic conditions. This complexity characteristic signifies that the result of science and technology activities can be greatly different from the anticipated results - depending on the influences from economic conditions and the results of science and technology activities which may be unpredictable. After reviewing the results of 17 variables related to science and technology characteristics of complex systems intended for time-series data - in the total R&D expenditure, and private R&D expenditure, numbers of SCI papers, the existence of chaotic characteristics were. using Lyapunov Exponent, Hurst Exponent, BDS test. This result reveals science and technology activity of the three most important components in Korea which are; heavy dependence on initial condition, the long term memory of time series, and non-linear structure. As stable R&D investment and result are needed in order to maintain steady development of Korea economy, the R&D structure should be less influenced by business cycles and more effective technology development policy for improving human resource development must be set in motion. And to minimize the risk of new technology, the construction of sophisticated technology forecasting system should take into account, for development of R&D system.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.