• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.029초

상위수준합성을 위한 배정가능범위 축소 스케줄링 (Mobility Reduction Scheduling for High-Level Synthesis)

  • 유희진;유희용
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제32권7호
    • /
    • pp.359-367
    • /
    • 2005
  • 본 논문은 자원제약 조건하에서 파이프라인 데이타패스 합성을 위한 스케줄링 방법을 제안한다. 제안 방법은 연산의 배정 가능한 제어단계들 중에서 처음과 마지막 제어단계에 임시로 연산을 배정하여 스케줄링 해가 존재하는지를 평가한다. 만약 해를 발견할 수 없다면 이는 자원제약 위반에 의해 연산을 그 제어단계에 배정하는 것이 불가능함을 의미하기 때문에 그 제어단계를 배정 가능한 제어단계 후보에서 제거한다 제안 알고리즘은 점진적 배정가능범위 축소에 기초하여 스케줄하고 자원 배정에 대한 영향을 고려하여 성능개선을 위한 해를 찾는다. 벤치마크에 대한 실험결과는 기존 방법들과 비교하여 개선된 실험결과를 보였다.

망원급수를 이용한 암호화 알고리즘 (A Cryptography Algorithm using Telescoping Series)

  • 최은정;사공융;박왕근
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

교통법규 위반자에 대한 사면과 교통사고 발생 간의 인과순환적 관계에 대한 연구 (A study on the Causal Feedback Relationship between Special Pardon for Traffic Law Violators and Traffic Accidents)

  • 최남희
    • 한국시스템다이내믹스연구
    • /
    • 제10권4호
    • /
    • pp.53-72
    • /
    • 2009
  • More than 24.43 million people received a special pardon to mark the anniversary of Liberation Day on Aug. 15 and to commemorate other national event, during 15years(1995-2009), in this period six times of presidential pardon was implemented. The special pardon allows traffic law violator to drive again with their violation records wiped clean. But traffic records show that traffic accidents used to increase very fast in a short period by up to 3-15 percent after implementing the every massive pardons. This study explores the causal feedback relationship between presidential special pardon for traffic law violators and the occurrence of an traffic accidents using a system thinking approach and simulation modelling. Particularly, this study focused on the analysing significant negative impact of the traffic pardon on the occurrence of worrisome traffic accidents. The results of this study show that presidential special pardon have had impact on the traffic accidents as a increasing leverage of positive feedback loop and the obedience of traffic law as a decreasing leverage of negative feedback loop. Finally, this study conclude that the cyclical increasing pattern of traffic accident is resulting from the periodically conducted presidential pardons with political aims.

  • PDF

정보시스템 책임감리 도입의 성공모델에 관한 실증연구 (An Empirical Study on Success Model of the Introduction of Responsible Supervision of Information Systems)

  • 김영호;김종배
    • 한국IT서비스학회지
    • /
    • 제11권4호
    • /
    • pp.39-50
    • /
    • 2012
  • With the obligation of information system supervision and an increase in supervision demands, the quality improvement in information system supervision has been of significance, and the supervision system has been enhanced in the way of preventing information systems from being poorly established. In the meantime, recently the supervision industry has received administrative punishment due to violation of supervision guidelines and false reports. As a result, the introduction of the responsible supervision of information systems to strengthen the rights and duties of supervisors and supervision corporations has been discussed by supervision corporations. Therefore, this work was intended to propose success factors to introduce responsible supervision in the information system supervision sector, and thereby contribute to the introduction of responsible supervision system that plays a successful role in preventing poor supervision and establishing information system business. The success factors of the responsible supervision of information systems, proposed in this work, were categorized into legal system, standardization of supervision work, those concerned with supervision. And, detailed success factors of each category were proposed, and on the basis of that, the success model to introduce responsible supervision successfully was proposed.

난수 기반의 ID 할당을 이용한 프라이버시 보호 RFID 시스템 (A Privacy Protection REID System using Random basis ID Allocating)

  • 박진성;최명렬
    • 한국산학기술학회논문지
    • /
    • 제7권6호
    • /
    • pp.1155-1159
    • /
    • 2006
  • 본 논문에서는 난수 기반의 ID를 동적으로 RFID 태그에 부여함으로써 태그의 ID 추적으로 인해 태그 소유자의 프라이버시가 침해당할 소지를 제거할 수 있는 RFID 시스템을 제안한다. 현재 RFID 시스템의 취약한 문제점으로 사생활 침해의 문제가 대두되고 있다. 이는 RFID 태그에 저장되는 ID를 추적함으로써 발생하고 있으며 본 논문에서는 이러한 문제점을 방지하기 위해 태그에 난수 기반의 ID를 필요할 때마다 동적으로 할당함으로써 ID 추적이 불가능한 RFID 시스템을 제안한다. 이러한 시스템은 대형 할인매장에서 손님들에게 태그를 나누어 주고 프라이버시를 보호하면서 그 이동 경로를 추적하여 고객정보를 축적하는 RFID 시스템에 적용할 수 있다.

  • PDF

주요설비 휴전시 계통 특성변화 고찰 (Observation on power system characteristic changes in case of outage)

  • 이운희;이창근;주행로;장성익
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.429-430
    • /
    • 2007
  • The enlargement of an electric power system network gives us much challenges concerning with network operation. In addition to it, the fast aging process of network equipments requires more chance to check and maintenance, and also the increase of heavy loaded facilities and the increase of the fault current in the network need to exchange with the larger facilities in capacity. Due to these reasons, outages trend to increase. Network solution studies for outages are performed mainly for two purposes. The first one is to find the countermeasures when the outage causes a violation of the network reliability criteria. And the second one is to minimize network constraints due to outages. There are so many outages around 400 for only one month. Therefore, in order to do case studies for outage, not only skilled persons are needed, but also many available tools to help properly. Concerning with proper tools, we will introduce a program which we developed to get informations concerned with network sensitivity, and an example to apply that program.

  • PDF

한국 지방자치단체 경관형성관련조례에 관한 연구 - 일본지방자치단체와 비교고찰을 통하여 - (A Study on the Ordinance on Landscape Composition by Korean Local Government - Focused on the Present State in Comparison with Japanese Local Government -)

  • 서주환;박대우
    • 농촌계획
    • /
    • 제11권1호
    • /
    • pp.25-33
    • /
    • 2005
  • This study conducted a comparative analysis on ordinances on landscape composition by local governments, which are a part of the policy to activate landscape composition, by examining the cases of Korea and Japan. For the purpose of specialized landscape compositions according to the own characteristics of Korean local governments, this study suggests factors to consider on the enactment of ordinance on landscape composition as follows. First, in order to compose landscape with an unique figure of the local government, it is required to collect and analyze informations about the local landscape, to provide consistent programs of education and publicity related to the landscape composition and to encourage the involvement of local citizens and reward it. Second, the construction of the ordinance needs to build a plan of landscape composition for each district focused on the landscape composition, to introduce a system which enables self-designation of an ordinance, to establish a detailed guidance, to assign the duty to keep the guidance and regulate punishment in case of a violation of the guidance. It could be done by completing the common or basic elements on the construction of the ordinance on landscape composition.

요양급여의 허위.부정청구 -사례연구 중심으로- (Nursing Care Fraud and False Billing - With the Case Study Basis -)

  • 허수진
    • 의료법학
    • /
    • 제13권1호
    • /
    • pp.41-69
    • /
    • 2012
  • First introduced in 1977, Korean health care system reached to national coverage in short period of time never seen before in any other countries, and rated as successful system protecting the health of the public at relatively low price. However, despite those positive evaluations, some of fraudulent medical organizations or pharmacies are hindering the sound development of the national health care system with meticulous false billing exaggerating the number of patients or the days of their treatment. To prevent aforementioned nursing home fraud and false billing, the misconduct should be punished as subject to the criminal law and severally punished for fines and payments which far exceed the expected amount of illicit gains as it is basically violation of criminal fraud, other than the forced return of illicit gains based on civil laws. Furthermore, the Health Insurance Review and Assessment Service should strengthen and complement the fraud investigators, the review process, and the professional training to raise the detection rates. It might also want to review ways to implement whistleblower rewarding system and rewards for evidences of healthcare fraud to overcome the limits of external review.

  • PDF

교통/사망 사고 발생건수 및 보도에 의한 범칙금 부과 방안 (Traffic Violation Fine Standard by the Severity and the Number of Total/Fatal Accidents)

  • 이태경;장명순
    • 대한교통학회지
    • /
    • 제16권4호
    • /
    • pp.89-98
    • /
    • 1998
  • 교통사고의 원인은 인적 요인, 차량적 요인, 도로 환경적 요인으로 분류된다. 주어진 도로 환경과 차량 조건하에서는 운전자가 마지막으로 안전을 제어할 책임을 지고 있다. 따라서, 교통사고를 사전에 예방하기 위하여 운전자의 교통법규 위반 행위에 대하여는 도로교통법에 근거하여 징역, 벌금, 구류, 과료, 과태료, 범칙금에 처하고 있다. 교통법규 위반 행위 단속 시에는 교통사고 유발 가능성과 위험도에 따라 단속의 강약을 포함하여 차등화된 처벌이 이루어져야 한다. 교통 범칙금 기준 제시를 위하여 1991~1995년의 5년간 교통사고 및 교통법규 위반을 분석한 결과 전체 교통법규 위반 단속 중 교통사고를 야기하는 동적 위반 행위인 사고관련 위반 행위 단속의 비율이 44%로 일본의 61%에 비해 매우 낮은 수준이다. 따라서 사고유발 가능성에 근거한 교통법규 위반 행위 단속의 강화가 필요하다. 한편 범칙금 부과방안으로 피해도 모형과 빈도 모형을 비교한 결과 교통법규 위반 행위로 인해 발생된 교통사고 비용을 고려한 피해도 모형은 범칙금의 차등화가 분명하지 않고 변별력이 뚜렷이 나타나지 않아 적합하지 않은 것으로 분석되었다. 교통법규 위반 행위에 따른 빈도 모형은 교통사고 건수와 사망사고 건수의 가중치(w)설정을 위해 동적 위반행위가 우리나라와 유사한 일본 자료와 비교한 결과 가중치가 한국=0.7, 일본=0.8일 때 상대적으로 $x^2$가 31.71로 가장 낮게 나타났다. 따라서, 사고건수에 대한 가중치는 0.7로 사망사고에 대한 가중치는 0.3을 적용하였다. 마지막으로 현행 범칙금과 제안된 범칙금을 비교분석하였다.

  • PDF

자율 기기를 위한 속도가 제어된 데이터 기반 실시간 스트림 프로세싱 (Rate-Controlled Data-Driven Real-Time Stream Processing for an Autonomous Machine)

  • 노순현;홍성수;김명선
    • 로봇학회논문지
    • /
    • 제14권4호
    • /
    • pp.340-347
    • /
    • 2019
  • Due to advances in machine intelligence and increased demands for autonomous machines, the complexity of the underlying software platform is increasing at a rapid pace, overwhelming the developers with implementation details. We attempt to ease the burden that falls onto the developers by creating a graphical programming framework we named Splash. Splash is designed to provide an effective programming abstraction for autonomous machines that require stream processing. It also enables programmers to specify genuine, end-to-end timing constraints, which the Splash framework automatically monitors for violation. By utilizing the timing constraints, Splash provides three key language semantics: timing semantics, in-order delivery semantics, and rate-controlled data-driven stream processing semantics. These three semantics together collectively serve as a conceptual tool that can hide low-level details from programmers, allowing developers to focus on the main logic of their applications. In this paper, we introduce the three-language semantics in detail and explain their function in association with Splash's language constructs. Furthermore, we present the internal workings of the Splash programming framework and validate its effectiveness via a lane keeping assist system.