• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.028 seconds

The Toeplitz Circulant Jacket Matrices (The Toeplitz Circulant Jacket 행렬)

  • Park, Ju Yong;Kim, Jeong Su;Szollosi, Ferenc;Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.19-26
    • /
    • 2013
  • In this paper we prove that all Jacket matrices are circulant and up to equivalence. This result leads to new constructions of Toeplitz Jacket(TJ) matrices. We present the construction schemes of Toeplitz Jacket matrices and the examples of $4{\times}4$ and $8{\times}8$ Toeplitz Jacket matrices. As a corollary we show that a Toeplitz real Hadamard matrix is either circulant or negacyclic.

Development and Evaluation of a Web-Based Instructional Program on Basic Nursing Science for Nursing Students (기초간호과학교육을 위한 웹기반 학습프로그램 개발 및 효과)

  • Yoo, Ji-Soo;Hwang, Ae-Ran;Hong, Hae-Sook;Park, Mi-Jung
    • Journal of Korean Biological Nursing Science
    • /
    • v.3 no.2
    • /
    • pp.63-68
    • /
    • 2001
  • Increasing interest in computer-mediated learning technologies has prompted educators to incorporate them into many learning environments ; however, there is still little evaluative evidence to support their effectiveness. This report describes the development and evaluation of a web-based instructional program on basic nursing science for nursing students. Researcher-designed questionnaires were used to assess the characteristics of our students, and to solicit their ratings of the instructional program on ease of use, accuracy of content, clarity of content, interest, and convenience of the program, using 5-point Likert scales. The respondents indicated that the package was easy and convenient to use, with high technical quality, and of a level challenging to some but not all of the students. On-line quizzes were most highly rated. Also it was confirmed that frequent users of electronic bulletin board showed much higher achievement score than that of nonfrequent users. It was also found that the effect of cyber education was dependent on the active participation of the students. These data suggest that the use of web-based instructional program as a distance education strategy can be an effective method for nursing students and nurses.

  • PDF

Disputes Patterns and Resolution Approaches in the Global Trading of Digital Goods (디지털상품의 국제거래 유형과 분쟁 해결방안)

  • Shim, Sang-Ryul;Jeong, Yoon-Say
    • Journal of Arbitration Studies
    • /
    • v.17 no.3
    • /
    • pp.145-167
    • /
    • 2007
  • Digital goods are defined as intangible and non-physical goods, composed of a combination of digital signals, electronically represented as 0 and 1. They are also called as digital products, electronic transmissions, information goods, digital contents, computer information, etc. Digital goods are now traded both domestically and internationally as well as on-line and off-line. Korean government revised the Basic Law on Foreign Trade to include digital goods and services as the scope of foreign trade in 2001. Trade volume of digital goods are increasing in Korea. The supply chains of digital goods from producing the components to selling globally to consumers are different from conventional physical goods. Mostly, digital goods are traded on the license basis rather than ownership contract. End User License Agreements(EULAs), such as shrink-wrap, click- wrap, or browser-wrap licenses are very popular in online transactions. Unlike conventional physical goods. the breach of license contract is closely linked with the infringement of intellectual property rights. Digitalized intellectual property is easy to copy and transmit in the cyber space. In cases of legal disputes from the breach of license contract, commercial arbitration or on-line alternative dispute resolutions(ADRs) are regarded as better approach to solve them rather than court sues. For promoting more secure and reliable international trade of digital goods. arbitration clauses should be included in most of license contracts.

  • PDF

The Effectiveness of Smoking Cessation Program in Adults: Systematic Review of Randomized Controlled Trials (성인 흡연자의 금연 프로그램 효과: 무작위대조군 실험연구의 체계적 문헌고찰)

  • Park, Seong-Hi;Hwang, Jeong-Hae;Choi, Yun-Kyoung;Kang, Chang-Bum
    • Korean Journal of Health Education and Promotion
    • /
    • v.29 no.3
    • /
    • pp.1-14
    • /
    • 2012
  • Objectives: The purpose of this study was to determine if smoking cessation programs (SCPs) are effective for adults through a systematic review of the results of such programs in large randomized controlled trials (RCTs). Methods: The PICO (Patient, Intervention, Comparator, Outcome) strategy was established, 1,160 literature from domestic and foreign electronic databases was reviewed, and 22 references were selected based on the inclusion and exclusion criteria. The quality of each reference was evaluated using the Scottish Intercollegiate Guidelines Network tool, and meta-analysis was carried out. Results: The SCPs were significantly effective for adult smokers. Smoking cessation counseling, education, and smoking cessation medications such as nicotine patch were more effective than the other interventions. However, the results showed short-term effects (within six months), and differences were observed among the SCPs. For the outcome measures for SCPs, the abstinence rate of seven days was mainly used, but differences were identified between the CO level and the cotinine-verified abstinence rate of smoking cessation. Conclusions: For a smoking cessation program for adult smokers, the strength of the evidence of the program's effectiveness in RCTs that provide the identified intervention strategies should be considered.

Classification and Verification of Semantic Constraints in ebXML BPSS

  • Kim, Jong-Woo;Kim, Hyoung-Do
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.318-326
    • /
    • 2004
  • The ebXML (Electronic Business using eXtensible Markup Language) Specification Schema is to provide nominal set of specification elements necessary to specify a collaboration between business partners based on XML. As a part of ebXML Specification Schema, BPSS (Business Process Specification Schema) has been provided to support the direct specification of the set of elements required to configure a runtime system in order to execute a set of ebXML business transactions. The BPSS is available in two stand-alone representations, a UML version and an XML version. Due to the limitations of UML notations and XML syntax, however, current ebXML BPSS specification is insufficient to specify formal semantic constraints of modeling elements completely. In this study, we propose a classification schema for the BPSS semantic constraints and describe how to represent those semantic constraints formally using OCL (Object Constraint Language). As a way to verify a Business Process Specification (BPS) with the formal semantic constraint modeling, we suggest a rule-based approach to represent the formal constraints and to use the rule-based constraints specification to verify BPSs in a CLIPS prototype implementation.

  • PDF

Security measures of Information and Communication infrastructure of Water Resources Field (댐·보 등 수자원분야 정보통신기반시설 보안대책)

  • Yu, Se-Hwan;Jang, Dong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1034-1037
    • /
    • 2013
  • ICT infrastructure is electronic control systems or communication network related to national security, public administration, defense, policing, finance. Water resources sector has been building a system of control that can be performed electronically, communications, management, energy, and other work-related. Water resources sector has been a paradigm shift in water management and the control system is integrated into a single network. The control system security vulnerabilities are exposed - other control networks, business networks, linking with outside agencies, etc. Cyber terrorist society can cause a huge mess economically, The importance of security for control systems is becoming. In this paper, ICT infrastructure - the water resources in the field of control systems will analysis security measures.

  • PDF

A Study on the Service Management of Libraries for Academic Courses in e-learning Environment (e-learning 환경에서 대학도서관 강의지원 서비스운영방안 연구)

  • Kim, So-Young;Cha, Mi-Kyeong
    • Journal of Information Management
    • /
    • v.38 no.3
    • /
    • pp.137-160
    • /
    • 2007
  • The purpose of this study is to examine the meaning and status of the current service of academic libraries in the aspect of its supporting roles for academic courses. The research methods include an examination of model cases from the U.S.A. and Hong Kong and also an electronic questionnaire survey of 32 academic libraries in Korea(67% response rate). With the result of the research analysis, this study aimed to provide optimal administrative plans in e-learning environment.

Aesthetic Characteristics of Modern Fashion Design with Emphasis on Transparency (투명성을 이용한 현대 패션디자인의 미적 특성)

  • Kim, Sun-Young
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.8
    • /
    • pp.17-26
    • /
    • 2008
  • The purpose of this study was to identify the aesthetic characteristics of modern fashion design use with a particular focus on transparency, and to help create future vision and feature. As part of the methodology for this study, I examined the concept of transparency, its characteristics and how it was expressed through art, architecture and other designs using literature research. Furthermore, I performed justifiable analysis on modern fashion design which used transparency from the 1990s till present. The following concepts were deciphered from information: Firstly, the concept of purity was highlighted. The emphasis here was to enhance the body's natural beauty with simple silhouettes that do not restrict its curves, using light materials such as clear vinyl, semi-clear materials or thin chiffon. Secondly, to express sensuality by exposing the body's curves with tight wrapping using clear materials, or with indirect and symbolic see-through techniques using contrasting clear, semi-clear and opaque materials. Thirdly, to express futurism through cyber and electronic images using high tech or shiny materials such as metal or holograms. Mechanical movements or effects of light are also used. Fourthly, to express playful characteristic by promoting surprises and disharmony that contradict with traditional techniques. This is carried out by intentionally exaggerating certain portions of clothes through disorder elements or confusion, and unsymmetrical shapes which destruct the human body's normal form.

On the enhancement of the learning efficiency of the self-organization neural networks (자기조직화 신경회로망의 학습능률 향상에 관한 연구)

  • Hong, Bong-Hwa;Heo, Yun-Seok
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.11-18
    • /
    • 2004
  • Learning procedure in the neural network is updating of weights between neurons. Unadequate initial learning coefficient causes excessive iterations of learning process or incorrect learning results and degrades learning efficiency. In this paper, adaptive learning algorithm is proposed to increase the efficient in the learning algorithms of Self-Organization Neural Networks. The algorithm updates the weights adaptively when learning procedure runs. To prove the efficiency the algorithm is experimented to classification of strokes which is the reference handwritten character. The result shows improved classification rate about 1.44~3.65% proposed method compare with Kohonan and Mao's algorithms, in this paper.

  • PDF

A Study on the System for Controlling Factory Safety based on Unity 3D (Unity 3D 기반 깊이 영상을 활용한 공장 안전 제어 시스템에 대한 연구)

  • Jo, Seonghyeon;Jung, Inho;Ko, Dongbeom;Park, Jeongmin
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.85-94
    • /
    • 2020
  • AI-based smart factory technologies are only increase short-term productivity. To solve this problem, collaborative intelligence combines human teamwork, creativity, AI speed, and accuracy to actively compensate for each other's shortcomings. However, current automation equipmens require high safety measures due to the high disaster intensity in the event of an accident. In this paper, we design and implement a factory safety control system that uses a depth camera to implement workers and facilities in the virtual world and to determine the safety of workers through simulation.