http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
박경렬,권기창,권영담,Park, Kyong-Youl,Kwon, Gi-Chang,Kwon, Young-Dam 한국데이터정보과학회 1998 한국데이터정보과학회지 Vol.9 No.2
We put the pseudo-random number generator into catagories like MiCG, MuCG, URG, ICG, EICG, and test uniformity and independency by 10,000 times through n empirical trial after selecting this random number generator. Here, from a fraction of data(20, 40, 60, 80, 100) with a significance level of 0.1, 0.05 and 0.01, we drive cumulative frequency with K-S, $X^{2}$, poker, run, autocorrelation test. As a result from the uniformity and independency among five random number generators based on all these data, all random number generator except EICG passed uniformity and independency test, and the URG turn out to be excellent in periodicity.
權寧淡,李鍾國 嶺南大學校 基礎科學硏究所 1992 基礎科學硏究 Vol.12 No.-
In the paper, we proposed a phoneme split algorithm and a morpheme analysis algorithm for auto-checking of ill-recognized character in Optical Korean Character Recognition System. The complexity of the problems asspciated with character recognition suggests that the system should include Post Processing. Through the two algorithms proposed in this paper, we could pick out ill-recognized character efficiently. So, we believe firmly that our algorithm will be available for correction of ill-recognized character using Dictionary Information.
李鍾國,權寧淡 嶺南大學校 基礎科學硏究所 1992 基礎科學硏究 Vol.12 No.-
In order that off-line handwritten digit recogniton system may be put to practical use, recognition speed as well as recognition rate must be considered. In this paper, we proposed a method of off-line handwritten digit recognition system and implemented it on Multitransputer in parallel. The whole processing scheme includes, thinning, feature extration, unique information extraction and recognition. We construct a 4-mesh connected processor array and allocate four processors for each processing tasks for parallel processing. In our experiment, recognition rate of 92% was obtained and recognition speed for each digit was 5856×64μsec and 2831×64μsec in sequential processing and parallel processing, respectively.
分散 시스템에서의 相互 不一致 發見 및 再調整 메카니즘
權寧淡 慶一大學校 1986 論文集 Vol.2 No.1
In many cases it is desirable to keep redundant copies of critical resources such as files in distributed systems. Although redundancy increases reliability and availability, it leads to mutual consistency problems when nework partitions occur. This paper describes a mechanism to detect mutual inconsistency by using the modified version vecter machanisms and suggests a method to reconsile these conflicts efficiently.
南寅佶,權寧淡 慶北工業專門大學 1984 論文集 Vol.21 No.-
A criterion for comparing variable-space page replacement algorithm is presented. An adaptive page replacement algorithm is described and shown to be optimum with respect to this criterion. The results of simulating Dening's working set, the page partition, and this algorithm are presented to demonstrate the improvement possible over the known realizable variable-space algorithm.
권영담 嶺南大學校 基礎科學硏究所 1991 基礎科學硏究 Vol.11 No.-
In this paper, I shall design and implement a meta-interpreter which can manage point query, range query, and list query in PROLOG database environment that is supported multi-key indexing. Also, by maintaining meta-knowledge for already loaded facts in meta-knowledgebase, this system can avoid the duplicated loads of same facts that decrease performance of query processing.
權寧淡,金重秀,金正洪 嶺南大學校附設 基礎科學硏究所 1988 基礎科學硏究 Vol.8 No.-
The efficient query processing is of im,portance ina distributed database management system. For a class of simple queries, it is possible to design optimization algorithm that will derive optimal distribution strategies. In this paper, a query <Extentended Simple Query> that is extension of simple query is defined. It is not necessary to reduce data transmission cost and to fully eliminate relations in a result site. Efficient algorithm for ESQ that considers semijonin operation sequences is presented.
Time Stamp를 이용한 Password 보안에 관한 연구
權寧淡 영남대학교 공업기술연구소 1989 연구보고 Vol.17 No.1
Due to the increasing values of information being stored in computers, it is very important that the unauthorized user can not access data in computers. Therefore, This paper proposed a long password scheme added time concept. This is an improved password, which presents a solution to observation, evaesdropping and cryptanalysis problems.