• Title/Summary/Keyword: Re number

Search Result 1,642, Processing Time 0.025 seconds

A scheme on strengthening of R.O.K reserved force (예비전력 정예화 방안)

  • Kim, Jae-Sam
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.1-45
    • /
    • 2007
  • Reserved forces of ROKA are in charge of replacement of TOE in the wartime and mission of rear area operation. But there is institutional inertia in the law and organization oriented to fill human resources rather than take mission. We need to prepare for the investment and arrangement of reserved forces as military power that would be replaced standing forces. In this portion, to reinforce reserve forces elite, First, efficient mobilization regulations and systems are suggested. I covered a maintenance of relevant mobilization ordinances which need to legislated and approved by national assembly for wartime and development of mobilization system which might lose the appropriate time for mobilization due to complicated declaration procedures and measures to overcome the panic at the initial stage of the war and organization and employment of nationwide transportation system and mobilization center. To ensure efficient resource management and mobilization of reserve forces with a number of approximately 3 million, there's a necessity of organization for integration and conciliation. To make it real, I suggested establishing and employing the mobilization center, on first phase, employ the mobilization center focusing on homeland divisions, on second phase, it is advisable to convert to national level mobilization system and develop to central mobilization center focusing on national emergency planning committee. During peacetime, in conjunction with Mobilization Cell, mobilization center can conduct resource survey and integrate and manage mobilization resources and take charge of mobilization training of subordinate units, and during wartime, in conjunction with mobilization coordination team and Cell, can ensure the execution of mobilization. Second, Future oriented reserve forces management system such as service system of reserve forces and support system of homeland defense operations. Current service and trainings of reserve forces by the year have very low connection, as it is very complex to manage the resources and trainings, and service and training lack the equity, re-establishment of service system is required. Also in an aspect of CSS and cultivation support for reserve forces, as the scope and limitation of responsibility between the armed forces and autonomous organization is obscure, conditions to conduct actual-fighting exercises are limited. Concentrated budgetting is extremely difficult because reserve forces training fields are scattered nationwide, and facilities and equipments are rapidly getting older. To improve all these, I suggest the organization of homeland defense battalion with a unit of "City-Gun-District" and supporting the local reserve forces. Conduct unit replacement or personal replacement for those who have finished their 1 or 2 years and homeland defense operation duty for those with 3-5 years for consistency and simplification. Third, I suggest Future oriented Reserved Training(FRT) and Training Center oriented training management to establish a reliable reserve training. Reserves carry out expansion of unit, conventional combat mission, homeland defense and logistics support during wartime, and actual-fighting exercise, and disaster relief, peace keeping activities. Despite diverse activities and roles, their training condition still stays definitely poor. For these reasons, Modernization of weapons and facilities through gradual replacement and procurement is essential to enhance mobilization support system.

  • PDF

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

A Study on Solution of Anomaly due to Integrated of Inheritance and Concurrency (상속성과 병행성에서 오는 상속변칙 문제 해결에 관한 연구)

  • Park, Young-Ok;Moon, Jeong-Hwan;Lee, Chiol-Seong;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.485-489
    • /
    • 2002
  • The concepts from OOP have been integrated in a concurrency, leading to the emergence of concurrent OOP. Concurrency of concurrent OOP and various model technique of OOP language are integrated had been proposed. Concurrent programming and OOP technique unite that can gain various kinds advantage to develop concurrency application program. There have been a number of models proposed for integrating concurrency and OOP However, concurrency and inheritance are two paradigms which are difficult to combine in a suitable manner. The inheritance anomaly is the conclicted phenomena, which occurs only when concurrency is integrated with inheritance. The inheritance anoay is referred to as the serious difficulty in integrating inheritance and concurrency in a simple and efficient manner within a concurrent OOP. Concurrency and inheritance with integrated that Drop reusability of object remarkably and require re-justice of code that is inherited in subclass. So concurrency and inheritance with integrated Collision that happen between two special qualitys or Interference phenomenon is inheritance anomaly. Effect of inheritance anomaly minimum Much study findings announced about access method to improve code reusability. Wish to approach in paper that is division by synchronization code and method code to solve interference problem between and concurrency.

  • PDF

Improvement of Flexible Zerotree Coder by Efficient Transmission of Wavelet Coefficients (웨이블렛 계수의 효율적인 전송에 따른 가변제로트리코더의 성능개선)

  • Joo, Sang-Hyun;Shin, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.9
    • /
    • pp.76-84
    • /
    • 1999
  • EZW proposed by Shapiro is based on a zerotree constructed in a way that a parent coefficient in a subband is related to four child coefficients in the next finer subband of similar orientation. This fixed treeing based on 1-to-4 parent-child is suitable to exploti hierachical correlations among subbands but not to exploit spatial correlations within a subband. A new treeing by Joo, et al. is suggested to simulatneously exploit those two correlatins by extending parent-child relationship in a flexible way. The flexible treeing leads to increasing the number of symbols and lowering entorpy comparing to the fixed treeing, and therefore a better compression can be resulted. In this paper, we suggest two techniques to suppress the increasing of symbols. First, a probing bit is generated to avoid redundant scan for insignivicant coefficients. Second, since all subbands do not always require the same kind of symbol-set, produced symbols are re-symbolized into binary codes according to a pre-defined procedure. Owing to those techniques, all symbols are generated as binary codes. The binary symbols can be entropy-coded by an adaptive arithmetic coding. Moerover, the binary symbol stream can give comparatively good performances without help of additional entropy coding. Our proposed coding scheme is suggested in two modes: binary coding mode and arithmetic coding mode. We evaluate the effectivenessof our modifications by comparing with the original EZW.

  • PDF

Stem Cell for the Present: Reconfiguration of Stem Cell Research, Ethics and Bio-industry in South Korea after the Hwang (현재를 위한 줄기세포: 황우석 사태 이후 한국에서 줄기세포 연구와 윤리, 바이오산업의 재구성)

  • Paik, Young-Gyung
    • Journal of Science and Technology Studies
    • /
    • v.12 no.1
    • /
    • pp.185-207
    • /
    • 2012
  • Since the Hwang scandal, the South Korean state has expressed often-conflicting interests of encouraging stem cell research and the IVF industry to save the country and introducing the ethical regulation in conformity with "Global Standard." As the tightening ethical regulation of stem cell research has enervated the field of human Embryonic stem cell(hESC) research, somatic stem cells (re-)emerged as an alternative savior that could rescue the future of research communities, bio-industry, practicing doctors, patients and the nation itself from the crisis. The recent literature on Korean biotechnology, however, mainly focus on hESC and relatively little attention has been given to the rapidly growing field of research on somatic stem cells like hematopoietic stem cells(HSCs) or Adipose derived stem cells(ASCs). While the hESC therapy is often regarded as experimental and ethically controversial, the HSCs or Mesenchymal stem cell(MSC) therapies have already made their ways into people's everyday life through market without much public discussion. Many ordinary people in South Korea are familiar with the story of patients who survived leukemia with the HSCs treatment; the number of doctors who are actively marketing the ASCs therapies is on the rapid increase; the concept of cosmetic products made from ASCs is gaining popularity among consumers. In this context, this article argues that the current ethical debates solely focusing on hESC or on the state policy and research regulation are too limiting to fully illuminate the politics of stem cell technologies in South Korea.

  • PDF

Vascular Plant Diversity of Jeju Island, Korea

  • Kim, Chan-Soo
    • Korean Journal of Plant Resources
    • /
    • v.22 no.6
    • /
    • pp.558-570
    • /
    • 2009
  • The vascular plants in Jeju composed of 21 families 62 genera, 190 species, 7 varieties with 197 taxa in Pteridophyta, 3 families 5 genera, 7 species, 3 forma with 10 taxa in gymnosperm (Coniferophyta) and 143 families 703 genera, 1,622 species, 114 varieties and 47 forma with 1,783 taxa in Endospermae. The total number of taxa was 1,990 consisting 167 families, 770 genera, 1,818 species, 121 varieties and 50 forma. Three families, 4 genera 4 species and 1 variety in Pteridophyta and 1 family, 1 genus I species, 1 forma of Coniferophyta were endemic to Jeju. Five families, 8 genera and 8 species in the Monocotyledonae of Endospermae and 23 families, 32 genera, 21 species, 16 varieties and 7 forma and 44 taxa in Cholipetalae, and 9 families, 24 genera, 12 species, 13 varieties and 7 forma, total 32 taxa in Sympetalae were endemic to Jeju. Total 90 taxa with 41 families, 69 genera, 46 species, 29 varieties and 15 forma were drawn up as endemic plants in Jeju. As the numbers show on, Jeju has more biodiversity especially plant diversity than any other places in Korea. It was an important region in regard to geographical position. The rarity on plants from Jeju has been assessed based on the IUCN red list categories and criteria at both regional and global levels. There was one species in each extinct (EX) and extinct in the Wild (EW). The EX and EW species were Rhododendron saisiuense Nakai (Ericaceae) and Asplenium antiquum Makino (Aspleniaceae), respectively. Three taxa, Rhododendron dauricum L. (Ericaceae), Lycopodium sieboldii Miq., and Lycopodiella cernua (L.) Serm (Lycopodiaceae) were species that is extinct in the region (RE). Sixty-one taxa were critically endangered (CR), 13 were endangered (EN), and 83 were vulnerable (VU) at regional level. The taxa listed on a Red List corresponds 26.9% of total taxa in Jeju. At global level, there were 19 taxa in CR, 4 in EN, and 1 in VU (Vulnerable) as the category of threat. The rest taxa (133 taxa) were classified as Least Concern (LC). According to the results of the assessment, conservation measures must be taken for total of 157 species that were categorized in threaten including one of EX, one of EW and three extinct in the region immediately. Of 157 species, 61 were CR, 13 are EN and 83 were VU.

ACMs-based Human Shape Extraction and Tracking System for Human Identification (개인 인증을 위한 활성 윤곽선 모델 기반의 사람 외형 추출 및 추적 시스템)

  • Park, Se-Hyun;Kwon, Kyung-Su;Kim, Eun-Yi;Kim, Hang-Joon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.39-46
    • /
    • 2007
  • Research on human identification in ubiquitous environment has recently attracted a lot of attention. As one of those research, gait recognition is an efficient method of human identification using physical features of a walking person at a distance. In this paper, we present a human shape extraction and tracking for gait recognition using geodesic active contour models(GACMs) combined with mean shift algorithm The active contour models (ACMs) are very effective to deal with the non-rigid object because of its elastic property. However, they have the limitation that their performance is mainly dependent on the initial curve. To overcome this problem, we combine the mean shift algorithm with the traditional GACMs. The main idea is very simple. Before evolving using level set method, the initial curve in each frame is re-localized near the human region and is resized enough to include the targe region. This mechanism allows for reducing the number of iterations and for handling the large object motion. The proposed system is composed of human region detection and human shape tracking modules. In the human region detection module, the silhouette of a walking person is extracted by background subtraction and morphologic operation. Then human shape are correctly obtained by the GACMs with mean shift algorithm. In experimental results, the proposed method show that it is extracted and tracked efficiently accurate shape for gait recognition.

  • PDF

The Study on the main viewpoints chosen for the landscape simulation evaluation (경관시뮬레이션 평가를 위한 주요 조망점 선정에 관한 연구)

  • Lee, Im jung;Choi, Joo youn
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7534-7540
    • /
    • 2015
  • In this paper, we set up a vista point overlooking the focus of new research center placed on the existing research literature and point to the selection of books, reports or studies actually suggested focusing on topics such as for landscape simulation evaluation. To re-organize and classify a number of items were presented to spill the evaluation items of this view point selection via the SPSS Statistics. Evaluation items 16 through a professional survey to establish a concrete and systematic plan with selected research results leaked technical characteristics of the view that detailed questions to the factors of technical characteristics and population-specific comparisons through factor analysis in the first, landscapes simulation The views were set out. Second, if you set 16 classified by type of view that considering a similar nature or characteristics depending on the properties of the view that publicity, overlooking castle, the castle was divided into three types of places. Third, the views point for the public good are three items, vista point at which the gender perspective has six items that gender point of view places is set to seven items, was set up to view the most appropriate place to point gender. These results provide a framework for analysis and future system reliability and landscape simulation evaluation study is expected to be used as reference material.

The Restructuring of the Chemical Industry in Jilin City, China (중국 지린(吉林)시 화학공업의 재구조화)

  • Lu, Bi-Shun;Zhan, Jun
    • Journal of the Korean association of regional geographers
    • /
    • v.15 no.6
    • /
    • pp.720-735
    • /
    • 2009
  • This paper studies the characteristics of the restructuring of chemical industrial complex in JiLin city since 1978 focusing on enterprise organization, the process of production, labor, and consumer market. The number of chemical industrial enterprises and their partnership with subcontractors have increased since 2001. As for the type of cooperation group, research institutes and local government are accounted for the greatest portion. The chemical industrial enterprise in JiLin which has adopted Fordism production method still has the highest percentage in 2007. And in the shift process of production system after China's entry into WTO(in 2001), chemical industrial enterprise in JiLin city takes allowing more investment in production technologies as core strategy, while taking improvement in equipment and development of new products as core strategy in the shift process of production technology. The degree of labor re-education was highest in 2007, and as for the relationship between labor and management, enterprises which evaluate the ability of performance of duty are increasing. The characteristics of restructuring of chemical industrial complex on consumer market, domestic market accounted for the greatest portion, on the other side the export is feeble. As for strategy of market restructuring, industrial enterprise in JiLin city should use Quality improvement and high-value added as core strategies to cope with alteration of market.

  • PDF