http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
權寧淡 嶺南大學校 基礎科學硏究所 1993 基礎科學硏究 Vol.13 No.-
Automatic recognition of seal imprint is required for the objective, precise, and fast verification of seal imprint. However, full automatic system is difficult to be implemented, so that man and computer interface system can be expected to have better result. In this paper, center projection method is proposed to verify seal imprint and used in the implemented man and computer interface seal imprint verification system. Automatic threshold method using CDF is also proposed to omit the normalization process required in the preprocessing step. Experimental results show good performance on classification and recognition of seal imprint.
Register-type memory의 構成과 活用에 關한 硏究
權寧淡 慶北工業專門大學 1984 論文集 Vol.21 No.-
Push-down list memory and first in first out list memory using register is described. With development of large-scale integration technology(Lsi), it is expected that devices with regular repetitive structure and high gate/interconnection ratio can be manufactured at extremely low cost. In this paper, the logic design of a push down and FiFo list memory are first described. Then with some addition control logic, it is shown that they can be converted to an associative memory.
分散 데이터베이스 시스템에서의 不一致 發見 및 再調整 알고리즘
權寧淡 嶺南大學校附設 基礎科學硏究所 1989 基礎科學硏究 Vol.9 No.-
In many cases it is desirable to keep redundant copies of critical resources such as files in distributed database systems. Although redundancy increases reliability and availability, it leads to mutual consistency problems when network partitions occur. This paper describes a mechanism to detect mutual inconsistency by using the modified version vector mechanisms and algorithms which detailed update operation and suggests a method to reconcile these conflicts efficiently.
Key 입력 System의 Software에 關한 硏究
權寧淡 慶北工業專門大學 1981 論文集 Vol.18 No.-
In minimum system of popular microcomputer the method of key-entry used to reduce expenses. In the case of Hex-keys in keyboard interface, if using encoder chip, they are simply constructed but expensive. In this paper the function of encoder chip is replaced with the program in software, so it is experimented an inexpensiveness. As a result of experiment in reality, they have been confirmed in sufficient operations.
Shift Register를 利用 Memory 構成에 關한 硏究
權寧淡 慶北工業專門大學 1981 論文集 Vol.18 No.-
Push-down list memory and first-in first-out list memory using shift register is described. With development of Large-scale lntegration technology (LSI), it is expected that devices with regular repetitive structure and high gate/interconnection ratio can be manufactured at extremely low cost. In this paper, the logic design of a push-down and FIFO List memory are first described. Then, with some additional control logic, it is shown that they can be converted to an associative memory.
分散 시스템에서의 相互 不一致 發見 및 再調整 메카니즘
權寧淡 慶一大學校 1986 論文集 Vol.2 No.1
In many cases it is desirable to keep redundant copies of critical resources such as files in distributed systems. Although redundancy increases reliability and availability, it leads to mutual consistency problems when nework partitions occur. This paper describes a mechanism to detect mutual inconsistency by using the modified version vecter machanisms and suggests a method to reconsile these conflicts efficiently.
권영담 嶺南大學校 基礎科學硏究所 1991 基礎科學硏究 Vol.11 No.-
In this paper, I shall design and implement a meta-interpreter which can manage point query, range query, and list query in PROLOG database environment that is supported multi-key indexing. Also, by maintaining meta-knowledge for already loaded facts in meta-knowledgebase, this system can avoid the duplicated loads of same facts that decrease performance of query processing.
Time Stamp를 이용한 Password 보안에 관한 연구
權寧淡 영남대학교 공업기술연구소 1989 연구보고 Vol.17 No.1
Due to the increasing values of information being stored in computers, it is very important that the unauthorized user can not access data in computers. Therefore, This paper proposed a long password scheme added time concept. This is an improved password, which presents a solution to observation, evaesdropping and cryptanalysis problems.
南寅佶,權寧淡 慶北工業專門大學 1984 論文集 Vol.21 No.-
A criterion for comparing variable-space page replacement algorithm is presented. An adaptive page replacement algorithm is described and shown to be optimum with respect to this criterion. The results of simulating Dening's working set, the page partition, and this algorithm are presented to demonstrate the improvement possible over the known realizable variable-space algorithm.