RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      • 좁혀본 항목

      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Decomposition of transformation semigroups

        김석태 한국지능시스템학회 2000 한국지능시스템학회논문지 Vol.10 No.2

        We introduce the concepts of TL-finite state machines TL-transformation semigroups and coverings and several decompositions of transformation semigroups and investigate some their algebraic structures.

      • KCI등재

        연결특성함수를 이용한 문서화상에서의 영역 분리와 문자열 추출

        김석태,이대원,박찬용,남궁재찬 한국통신학회 1997 韓國通信學會論文誌 Vol.22 No.11

        This paper describes a method for region segmentation and string extractionin documents which are mixed with text, graphic and picture images by the use of the structural characteristic of connceted components. In segmentation of non-text regionas, with connection-characteristic functions which are made by structural characteristic of connected components, segmentation process is progressed. In the string extraction, first we organize basic-unit-region of which vertical and horizontal length are 1/4 of average length of connection components. Second, by merging the basic-unit-regions one other that have smaller values than a given connection intensity threshold. Third, by linking the word blocks with similar block anagles, initial strings are cresed. Finally the whold strings are generated by merging remaining word blocks whose angles are not decided, if their height and prosition are similar to the initial strings. This method can extract strings that are neither horizontal nor of various character sizes. Through computer exteriments with different style documents, we have shown that the feasibility of our method successes.

      • KCI등재후보

        TPSACA를 이용한 완전 해상 알고리즘

        김석태,이석기,최언숙,조성진 한국정보통신학회 2004 한국정보통신학회논문지 Vol.8 No.6

        One of the fundamental problems in computer science is how to store information so that it can be searched and retrieved efficiently. Hashing is a technique which solves this problem. In this paper, we propose a tree construction algorithm using linear two-predecessor single attractor cellular automata C and its complemented cellular automata. Also by using the concept of MRT we give a perfect hasing algorithm based on C. 컴퓨터 과학에서의 중요한 문제중의 하나가 "정보를 어떻게 잘 저장하고 효과적으로 검색할 수 있는가" 이다. 이러한 문제를 해결하는 기술이 해싱이다. 본 논문에서는 두 개의 직전자와 하나의 끌개를 갖는 선형 셀룰라 오토마타와 그것의 여원 셀룰라 오토마타의 특성을 이용하여 만들어진 트리구성 알고리즘을 제안한다. 또한, MRT 개념을 이용한 두 개의 직전자와 하나의 끌개를 갖는 선형 셀룰라 오토마타를 기반으로 하는 완전 해싱 알고리즘을 제안한다.

      • Management of e-Business Risk

        김석태 국제e-비즈니스학회 2002 e-비즈니스 연구 Vol.3 No.2

        The objective of this paper is to evaluate the type and characteristics of e-business risks and ultimately to offer effective risk management methods for e-business. While e-business risks increase in type and magnitude with the development of IT industry and the rapid expansion of e-commerce, studies on this area are quite sparse. In effect, the effort of mitigating risks in an industry in the full fledged scale had only begun in the latter half of the 1990s, especially in the banking sector, in which a myriad of methods of managing market risks and credit risks have been introduced. In this paper, e-business risks are classified into two broad types of risks, one is financial risk and the other non-financial risks, even though other schemes can be employed in classifying the risks. Financial risks can be sub-classified into market risk and credit risk which banks are especially more concerned about. Non-financial risks are security risk, operational risk, legal risk, strategic risk, network risk, transaction fraud risk, reputation risk, non-financial risks, among others. Risk management can be achieved internally as well as externally. Effective risk management in the e-business should be based on the framework as follows: first, the risk management should be consistent with the corporate long term strategy, second, it should be equipped with well specified procedures, third, it needs to be integrated rather than independently addressed, fourth, internal and external management should be weighed in terms of cost and benefit. While this paper attempt to provide an insight into the e-business risk, additional effort should be exercised to develop more formal model to measure the relevant risks, along with effective risk management methods. Key Work : e-business risk, financial risk, non-financial risks,non-financial risks

      • VRML을 이용한 유비쿼터스 전시공간 사전시뮬레이션에 관한 연구

        김석태 한국문화공간건축학회 2005 한국문화공간건축학회논문집 Vol.- No.13

        With the super-high speed internet network that was established at the end of 1990's, computers have emerged as the most common appliance. Other electronic devices, such as cellular phones and digital cameras are also being rapidly integrated into a sophisticated society. Now, most people own multiple computers, whether obvious or not. Maintenance of computers has also become easier. Based on such infra, the government announced IT 839 project, and it has a plan to construct a home-network system to 10 million houses by the year 2007. In addition, the development of ubiquitous industry is in rapid movement under the leadership of japan and america in the world. Therefore, the exhibition space for ubiquitous and its system management will become a reality. In order for the successful design of such ubiquitous space, testing space is necessary at the planning level, which requires careful simulation. However, the advance building of Mockup space in equivalent scale would be impossible due to time and money constraints. For example, many foreign companies strive to be the first in suggesting ubiquitous testing concepts, however, such testing houses are for their business promotion not a testing space for a particular building. This study suggests the possibility of creating a computational exhibition scenario for Ubiquitous using virtual reality media that substitute Mockup space. This method can be developed into a future virtual model, which can substitute a real testing model. The space of Ubiquitous and virtual reality defines Ubiquitous facility unit into PROTO Node of VRML by using the common feature called object-oriented interaction. It focuses on the connection of network in space to Routing of VRML and suggests methods to transfer several virtual scenarios into Routing Diagram of VRML. Through the development of effective methodology of such Ubiquitous space plan, we expect more scientifically applied virtual reality simulation and the development of an ideal Ubiquitous construction.

      • KCI등재

        A Study on the Effective Risk Management of Hedge Funds

        김석태 한국무역연구원 2015 貿易 硏究 Vol.11 No.6

        The objective of this study is to analyze various risks which may arise in managing hedge funds and to further derive out effective risk management methods of those risks. From the global perspective, hedge funds were introduced decades ago and have been quite well advanced in the financial fields. However, unique aspects of hedge funds in the nonlinear and nonnormal payoffs have incurred many failures as well. Compared with a long history of hedge funds in the developed financial markets, Korea began to allow hedge funds to float in the markets only from 2011. Since the introduction of hedge funds in Korea, the size and variety have been increased significantly, even still far behind those of the advanced countries. However, since many limits and regulations on hedge fund industry are about to be lifted and relaxed from October 2015, numerous asset management firms are planning to jump in this market. As an investment vehicle, new opportunities in this sector could be accompanied by many new and unseen risks. This study maps out various risks associated with hedge funds such as market risk, credit risk, liquidity risk, operational risk, reputation risk, and other risks depending upon the styles and strategies of hedge funds. Then various risk measures are compared and evaluated. Finally, it offers some effective risk management methods.

      맨 위로 스크롤 이동