http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
COMPUTATION OF A (CANONICAL) DOUBLY PERFECT ELIMINATION ORDERING OF A DOUBLY CHORDAL GRAPH
Lee, Mahn-Hoon,Kim, Chang-Hwa 한국전산응용수학회 1998 Journal of applied mathematics & informatics Vol.5 No.2
The class of doubly chordal graphs is a subclass of chordal graphs and a superclass of strongly chordal graphs which arise in so many application areas. Many optimization problems like domination and Steiner tree are NP-complete on chordal graps but can be solved in polynomial time on doubly chordal graphs. The central to designing efficient algorithms for doulby chordal graphs is the concept of (canonical)doubly perfect elimination orderings. We present linear time algorithms to compute a (canonical) double perfect elimination ordering of a doubly chordal graph.
ON THE STABILITY OF A MODIFIED JENSEN TYPE CUBIC MAPPING
Hark Mahn Kim,Hoon Ko,Ji ae Son 충청수학회 2008 충청수학회지 Vol.21 No.1
In this paper we introduce a Jensen type cubic functional equation f3x + y2+ fx + 3y2= 12fx + y2+ 2f(x) + 2fy),and then investigate the generalized Hyers–Ulam stability problem for the equation.
太白山 鑛化帶 中部地域 페그마타이트에 대한 地化學的 硏究
Sung Hoon Choi(崔成薰),Jeong Mahn Chi(池楨蔓) 대한자원환경지질학회 1990 자원환경지질 Vol.23 No.1
This study has been carried out on the Pegmatites, Naedeogri Granites, Nonggeori Granites and Metasedimentary rocks in the middle area of Taebaeksan region to investigate the geochemical properties and possibility of productivity. Pegmatites are characterized by metamorphosed anatectic pegmatite and differentiated magmatic pegmatite, and are mixed type of rare-element pegmatite and mica-bearing pegmatite by the classification of Ginsburg(1979). The petrological type of the igneous rocks is thought to be calcalkali, subalkaline and peralumious. According to chemical variations against D. I., differentiation trends from Naedeogri and Nonggeori Granites through non-mineralized pegmatites to mineralized pegmatites are supposed. From the relationship between oxided and SiO₂, pegmatites and Nonggeori Granite have shown similar tendencies and bulk composition of pegmatites and similar to metasedimentary rocks near the intrusives. By judging the correlations of trace elements, it is elucidated that pegmatites adjacent to Naedeogri and Nonggeori Granites have been originated in magma differentiation from these granites and the others have been differentiated by remelting or partial melting from metasedimentary rocks. Sp₅, Sp₈, and Sp₉, pegmatites are considered as productive rocks, and Sp₄, Sp₆, Sp₇, Sp₁₀, Sp₁₁, and Sp₁₂, pegmatites and granites are supposed to have a weak productivity, in terms of element ratios related with Sn mineralizations. Tourmalines in productive pegmatites are formed under the circumstance of Li-poor granitoids and associated with pegmatites, and the others are seemed to be originated in metapelites and metapsammites which are not coexisting with an Al-saturating phase. Three types of chemical zoning are noticed in tourmalines: (1) apparently homogeneous compositional patterns, (2) a continuous core-to-rim zoning and, (3) a discontinuous core-to-rim zoning. From results of EPMA of tourmalines, Al, Mg and Ca increase closer to rim, while Fe decreases.
비밀키를 NAF로 사용하는 암호시스템의 차분 전력분석 공격
안만기 ( Mahn-ki Ahn ),하재철 ( Jae-cheol Ha ),이훈재 ( Hoon-jae Lee ),문상재 ( Sang-jae Moon ) 한국인터넷정보학회 2003 인터넷정보학회논문지 Vol.4 No.3
전력 분석 공격은 스마트 카드를 사용하는 암호 시스템에 대한 물리적 공격이다. 본 논문에서는 타원곡선 암호 알고리듬을 사용하는 스마트 카드가 비밀키를 NAF(non-adjacent form)로 부호화하여 사용하여도 차분 전력분석 공격에 대응할 수 없음을 실험을 통하여 제시하였다. 공격 대상인 비밀키를 모르는 스마트 카드에서 암호 알고리듬 동작 시점부터 측정된 평균 전력 신호와 비밀키 변경이 가능한 스마트 카드에서 측정된 평균 전력 신호를 차분함으로써 비밀키를 한 비트씩 순차적으로 알아낼 수 있다. The power analysis attack is a physical attack which can be applied to the cryptosystems such as smartcard. We try to experimental attack to a smart card which implemented Elliptic Curve Cryptosystem adopting NAF algorithm as a secret key recording method. Our differential power analysis attack is a potential threat to that implementation. The attacker measures the power traces during the multiplication with secret key bits in a target smart card and the multiplication with the guessed bits in other experimental one. The comparison of these two traces gives a secret bit, which means that attacker can find all secret key bits successively.
인과지도 분석을 통한 긍정심리자본과 21세기 정치리더십의 재고찰
박상만 ( Sang Mahn Park ),김강훈 ( Gang Hoon Kim ) 한국시스템다이내믹스학회 2013 한국시스템다이내믹스 연구 Vol.14 No.4
The main purpose of this research is to introduce PsyCap(Positive Psychological Capital) and new leadership helping ordinary people to create positive thinking and leading to social integration in South Korea. Additionally, by looking at conventional leadership theories and by applying the PsyCap to leadership based on causal loop analysis, this study is to seek new approach which political leader is able to communicate with the people and can help the people to build positive mine. Throughout this study, there are several important implications how political leader can lead to social integration and stable political development in South Korea. In particular, when political leader encourage the people to have confidence to take on and put in the necessary effort to succeed at challenging tasks, when political leader make the people a positive attribution (optimism) about succeeding now and in the future, when political leader help the people to persevere toward goals and redirection paths to goals (hope) in order to succeed, and when political leader make the people beset by problems and adversity environment to overcome these concerns, it can be expected political leader to build social integration and the people to create positive thinking which has been emphasized by political leader in South Korea. Finally, 21st century has required new political leadership that the people are able to make positive psychological capital composed by optimism, hope, confidence, and resilience.
행위자 네트워크 이론(actornetworktheory)을 기반으로 한교육공학의 학문적 정체성 탐구
류재훈 ( Jae Hoon Ryu ),최윤미 ( Yoon Mee Choi ),김령희 ( Ryeong Hee Kim ),유영만 ( Yeong Mahn You ) 한국교육공학회 2016 교육공학연구 Vol.32 No.1
본 연구의 목적은 인간과 기술의 관계에 급진적 관점을 제시하는 행위자 네트워크 이론(actor-network theory: 이하에서 ANT로 표시)에 비추어 교육공학의 학문적 정체성을 탐색하는 것이다. ANT는 기술을 포함한 비인간 행위자에게 인간과 동등한 지위를 부여함으로써, 그동안 서양철학에 내재되어 있는 주체/객체, 인간/기술 등의 이분법적인 관념의 틀을 탈피하는 대안적 관점을 제시한다. 인간과 기술을 둘러싼 다양한 현상을 여러 행위자들 간의 상호작용을 통한 관계적 효과로 이해하는 ANT의 철학적 입장을 분석함으로써 교육공학의 학문적 정체성을 재조명하는 계기를 마련하고자 한다. 본 연구에서는 우선 ANT의 개념과 원리가 무엇인지를 살펴본다. 이는 ANT에 비추어 교육공학을 바라보는 관점을 확대하고자하는 본 연구의 자연스러운 출발점이 된다. ANT의 개념과 원리를 토대로 ANT를 기반으로 한 교육공학을 상정하고, 이것이 기존(실증주의, 구성주의 기반)의 교육공학과 어떠한 패러다임의 차이가 있는지 존재론적(ontological), 인식론적(epistemological), 가치론적(axiological), 방법론적(methodological) 측면에서 논의한다. ANT에 기반 한 교육공학은 첨단기술이 교육에 유입되어 적극적으로 활용되고 있는 현시점에서 기존 교육공학의 한계를 극복할 수 있는 실마리를 제공한다. The aim of this study is to explore the identity of educational technology in the light of actor-network theory(ANT), which has been considered the most radical theory of the relation of human and technology in the science and technology studies(STS) field. ANT regards artifacts and nonhuman beings like technology, as same agents like humans, and explains how the couple human/non-human should be substituted for the insurmountable dichotomy between subject and object, human and technology, entrenched in western philosophy. ANT refers phenomena surrounding people to the complex networks of heterogeneous agents such as human, nonhuman beings, and artifacts, and with the following review of ANT philosophy this study attempts to present the theoretical explication of the educational technology``s academic identity. In this regard, first, it elucidates ANT conceptual terms. Secondly, it interprets the educational technology in the light of ANT philosophy -the ontological, epistemological, axiological, methodological aspects, by comparing two dominant traditional paradigm in educational technology(positivism and constructionism), with the alternative one.