• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.039 seconds

Mobility Reduction Scheduling for High-Level Synthesis (상위수준합성을 위한 배정가능범위 축소 스케줄링)

  • Yoo, Hee-Jin;Yoo, Hee-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.359-367
    • /
    • 2005
  • This paper presents a scheduling approach for synthesizing pipelined datapaths under resource constraints. The proposed approach evaluates whether or not a scheduling solution can exist in case an operation temporarily is assigned to the earliest or latest control step among the assignable steps for the operation. If a solution cannot be found, it is impossible to assign the operation to that control step due to a violation against resource constraints, and so we can eliminate that control step among candidate assignable control steps. The proposed algorithm builds up a schedule based on gradual mobility reduction and finds a solution that yields high performance by evaluating on the impact on register assignment. Experiments on benchmarks show that this approach gains a considerable improvement over previous approaches.

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

A study on the Causal Feedback Relationship between Special Pardon for Traffic Law Violators and Traffic Accidents (교통법규 위반자에 대한 사면과 교통사고 발생 간의 인과순환적 관계에 대한 연구)

  • Choi, Nam-Hee
    • Korean System Dynamics Review
    • /
    • v.10 no.4
    • /
    • pp.53-72
    • /
    • 2009
  • More than 24.43 million people received a special pardon to mark the anniversary of Liberation Day on Aug. 15 and to commemorate other national event, during 15years(1995-2009), in this period six times of presidential pardon was implemented. The special pardon allows traffic law violator to drive again with their violation records wiped clean. But traffic records show that traffic accidents used to increase very fast in a short period by up to 3-15 percent after implementing the every massive pardons. This study explores the causal feedback relationship between presidential special pardon for traffic law violators and the occurrence of an traffic accidents using a system thinking approach and simulation modelling. Particularly, this study focused on the analysing significant negative impact of the traffic pardon on the occurrence of worrisome traffic accidents. The results of this study show that presidential special pardon have had impact on the traffic accidents as a increasing leverage of positive feedback loop and the obedience of traffic law as a decreasing leverage of negative feedback loop. Finally, this study conclude that the cyclical increasing pattern of traffic accident is resulting from the periodically conducted presidential pardons with political aims.

  • PDF

An Empirical Study on Success Model of the Introduction of Responsible Supervision of Information Systems (정보시스템 책임감리 도입의 성공모델에 관한 실증연구)

  • Kim, Young-Ho;Kim, Jong-Bae
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.39-50
    • /
    • 2012
  • With the obligation of information system supervision and an increase in supervision demands, the quality improvement in information system supervision has been of significance, and the supervision system has been enhanced in the way of preventing information systems from being poorly established. In the meantime, recently the supervision industry has received administrative punishment due to violation of supervision guidelines and false reports. As a result, the introduction of the responsible supervision of information systems to strengthen the rights and duties of supervisors and supervision corporations has been discussed by supervision corporations. Therefore, this work was intended to propose success factors to introduce responsible supervision in the information system supervision sector, and thereby contribute to the introduction of responsible supervision system that plays a successful role in preventing poor supervision and establishing information system business. The success factors of the responsible supervision of information systems, proposed in this work, were categorized into legal system, standardization of supervision work, those concerned with supervision. And, detailed success factors of each category were proposed, and on the basis of that, the success model to introduce responsible supervision successfully was proposed.

A Privacy Protection REID System using Random basis ID Allocating (난수 기반의 ID 할당을 이용한 프라이버시 보호 RFID 시스템)

  • Park, Jin-Sung;Choi, Myung-Ryul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1155-1159
    • /
    • 2006
  • In this paper, we have proposed a privacy protection RFID system using random number based ID allocation. Currently, there are rising issues about privacy violation in RFID system. This issues caused by tracking the ID of tag which present unique identity of tag. The proposed system dynamically allocates random basis ID to tag, then the tag can not be traced. The random ID allocation procedures of this system can be operate in cryptographic mode or normal(non-cryptographic) mode. This system can be applied to privacy protected customer tracking RFID system in mesa-outlet stores which tracing customer's moving path.

  • PDF

Observation on power system characteristic changes in case of outage (주요설비 휴전시 계통 특성변화 고찰)

  • Lee, Woon-Hee;Lee, Chang-Gun;Joo, Hang-Roe;Jang, Sung-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.429-430
    • /
    • 2007
  • The enlargement of an electric power system network gives us much challenges concerning with network operation. In addition to it, the fast aging process of network equipments requires more chance to check and maintenance, and also the increase of heavy loaded facilities and the increase of the fault current in the network need to exchange with the larger facilities in capacity. Due to these reasons, outages trend to increase. Network solution studies for outages are performed mainly for two purposes. The first one is to find the countermeasures when the outage causes a violation of the network reliability criteria. And the second one is to minimize network constraints due to outages. There are so many outages around 400 for only one month. Therefore, in order to do case studies for outage, not only skilled persons are needed, but also many available tools to help properly. Concerning with proper tools, we will introduce a program which we developed to get informations concerned with network sensitivity, and an example to apply that program.

  • PDF

A Study on the Ordinance on Landscape Composition by Korean Local Government - Focused on the Present State in Comparison with Japanese Local Government - (한국 지방자치단체 경관형성관련조례에 관한 연구 - 일본지방자치단체와 비교고찰을 통하여 -)

  • Seo, Ju-Hwan;Park, Dae-Woo
    • Journal of Korean Society of Rural Planning
    • /
    • v.11 no.1 s.26
    • /
    • pp.25-33
    • /
    • 2005
  • This study conducted a comparative analysis on ordinances on landscape composition by local governments, which are a part of the policy to activate landscape composition, by examining the cases of Korea and Japan. For the purpose of specialized landscape compositions according to the own characteristics of Korean local governments, this study suggests factors to consider on the enactment of ordinance on landscape composition as follows. First, in order to compose landscape with an unique figure of the local government, it is required to collect and analyze informations about the local landscape, to provide consistent programs of education and publicity related to the landscape composition and to encourage the involvement of local citizens and reward it. Second, the construction of the ordinance needs to build a plan of landscape composition for each district focused on the landscape composition, to introduce a system which enables self-designation of an ordinance, to establish a detailed guidance, to assign the duty to keep the guidance and regulate punishment in case of a violation of the guidance. It could be done by completing the common or basic elements on the construction of the ordinance on landscape composition.

Nursing Care Fraud and False Billing - With the Case Study Basis - (요양급여의 허위.부정청구 -사례연구 중심으로-)

  • Huh, Su-Jin
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.41-69
    • /
    • 2012
  • First introduced in 1977, Korean health care system reached to national coverage in short period of time never seen before in any other countries, and rated as successful system protecting the health of the public at relatively low price. However, despite those positive evaluations, some of fraudulent medical organizations or pharmacies are hindering the sound development of the national health care system with meticulous false billing exaggerating the number of patients or the days of their treatment. To prevent aforementioned nursing home fraud and false billing, the misconduct should be punished as subject to the criminal law and severally punished for fines and payments which far exceed the expected amount of illicit gains as it is basically violation of criminal fraud, other than the forced return of illicit gains based on civil laws. Furthermore, the Health Insurance Review and Assessment Service should strengthen and complement the fraud investigators, the review process, and the professional training to raise the detection rates. It might also want to review ways to implement whistleblower rewarding system and rewards for evidences of healthcare fraud to overcome the limits of external review.

  • PDF

Traffic Violation Fine Standard by the Severity and the Number of Total/Fatal Accidents (교통/사망 사고 발생건수 및 보도에 의한 범칙금 부과 방안)

  • 이태경;장명순
    • Journal of Korean Society of Transportation
    • /
    • v.16 no.4
    • /
    • pp.89-98
    • /
    • 1998
  • 교통사고의 원인은 인적 요인, 차량적 요인, 도로 환경적 요인으로 분류된다. 주어진 도로 환경과 차량 조건하에서는 운전자가 마지막으로 안전을 제어할 책임을 지고 있다. 따라서, 교통사고를 사전에 예방하기 위하여 운전자의 교통법규 위반 행위에 대하여는 도로교통법에 근거하여 징역, 벌금, 구류, 과료, 과태료, 범칙금에 처하고 있다. 교통법규 위반 행위 단속 시에는 교통사고 유발 가능성과 위험도에 따라 단속의 강약을 포함하여 차등화된 처벌이 이루어져야 한다. 교통 범칙금 기준 제시를 위하여 1991~1995년의 5년간 교통사고 및 교통법규 위반을 분석한 결과 전체 교통법규 위반 단속 중 교통사고를 야기하는 동적 위반 행위인 사고관련 위반 행위 단속의 비율이 44%로 일본의 61%에 비해 매우 낮은 수준이다. 따라서 사고유발 가능성에 근거한 교통법규 위반 행위 단속의 강화가 필요하다. 한편 범칙금 부과방안으로 피해도 모형과 빈도 모형을 비교한 결과 교통법규 위반 행위로 인해 발생된 교통사고 비용을 고려한 피해도 모형은 범칙금의 차등화가 분명하지 않고 변별력이 뚜렷이 나타나지 않아 적합하지 않은 것으로 분석되었다. 교통법규 위반 행위에 따른 빈도 모형은 교통사고 건수와 사망사고 건수의 가중치(w)설정을 위해 동적 위반행위가 우리나라와 유사한 일본 자료와 비교한 결과 가중치가 한국=0.7, 일본=0.8일 때 상대적으로 $x^2$가 31.71로 가장 낮게 나타났다. 따라서, 사고건수에 대한 가중치는 0.7로 사망사고에 대한 가중치는 0.3을 적용하였다. 마지막으로 현행 범칙금과 제안된 범칙금을 비교분석하였다.

  • PDF

Rate-Controlled Data-Driven Real-Time Stream Processing for an Autonomous Machine (자율 기기를 위한 속도가 제어된 데이터 기반 실시간 스트림 프로세싱)

  • Noh, Soonhyun;Hong, Seongsoo;Kim, Myungsun
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.4
    • /
    • pp.340-347
    • /
    • 2019
  • Due to advances in machine intelligence and increased demands for autonomous machines, the complexity of the underlying software platform is increasing at a rapid pace, overwhelming the developers with implementation details. We attempt to ease the burden that falls onto the developers by creating a graphical programming framework we named Splash. Splash is designed to provide an effective programming abstraction for autonomous machines that require stream processing. It also enables programmers to specify genuine, end-to-end timing constraints, which the Splash framework automatically monitors for violation. By utilizing the timing constraints, Splash provides three key language semantics: timing semantics, in-order delivery semantics, and rate-controlled data-driven stream processing semantics. These three semantics together collectively serve as a conceptual tool that can hide low-level details from programmers, allowing developers to focus on the main logic of their applications. In this paper, we introduce the three-language semantics in detail and explain their function in association with Splash's language constructs. Furthermore, we present the internal workings of the Splash programming framework and validate its effectiveness via a lane keeping assist system.