http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
개별검색 DB통합검색이 안되는 DB는 DB아이콘을 클릭하여 이용하실 수 있습니다.
통계정보 및 조사
예술 / 패션
<해외전자자료 이용권한 안내>
- 이용 대상 : RISS의 모든 해외전자자료는 교수, 강사, 대학(원)생, 연구원, 대학직원에 한하여(로그인 필수) 이용 가능
- 구독대학 소속 이용자: RISS 해외전자자료 통합검색 및 등록된 대학IP 대역 내에서 24시간 무료 이용
- 미구독대학 소속 이용자: RISS 해외전자자료 통합검색을 통한 오후 4시~익일 오전 9시 무료 이용
※ 단, EBSCO ASC/BSC(오후 5시~익일 오전 9시 무료 이용)
This paper describes a method for region segmentation and string extractionin documents which are mixed with text, graphic and picture images by the use of the structural characteristic of connceted components. In segmentation of non-text regionas, with connection-characteristic functions which are made by structural characteristic of connected components, segmentation process is progressed. In the string extraction, first we organize basic-unit-region of which vertical and horizontal length are 1/4 of average length of connection components. Second, by merging the basic-unit-regions one other that have smaller values than a given connection intensity threshold. Third, by linking the word blocks with similar block anagles, initial strings are cresed. Finally the whold strings are generated by merging remaining word blocks whose angles are not decided, if their height and prosition are similar to the initial strings. This method can extract strings that are neither horizontal nor of various character sizes. Through computer exteriments with different style documents, we have shown that the feasibility of our method successes.
One of the fundamental problems in computer science is how to store information so that it can be searched and retrieved efficiently. Hashing is a technique which solves this problem. In this paper, we propose a tree construction algorithm using linear two-predecessor single attractor cellular automata C and its complemented cellular automata. Also by using the concept of MRT we give a perfect hasing algorithm based on C. 컴퓨터 과학에서의 중요한 문제중의 하나가 "정보를 어떻게 잘 저장하고 효과적으로 검색할 수 있는가" 이다. 이러한 문제를 해결하는 기술이 해싱이다. 본 논문에서는 두 개의 직전자와 하나의 끌개를 갖는 선형 셀룰라 오토마타와 그것의 여원 셀룰라 오토마타의 특성을 이용하여 만들어진 트리구성 알고리즘을 제안한다. 또한, MRT 개념을 이용한 두 개의 직전자와 하나의 끌개를 갖는 선형 셀룰라 오토마타를 기반으로 하는 완전 해싱 알고리즘을 제안한다.
The objective of this paper is to evaluate the type and characteristics of e-business risks and ultimately to offer effective risk management methods for e-business. While e-business risks increase in type and magnitude with the development of IT industry and the rapid expansion of e-commerce, studies on this area are quite sparse. In effect, the effort of mitigating risks in an industry in the full fledged scale had only begun in the latter half of the 1990s, especially in the banking sector, in which a myriad of methods of managing market risks and credit risks have been introduced. In this paper, e-business risks are classified into two broad types of risks, one is financial risk and the other non-financial risks, even though other schemes can be employed in classifying the risks. Financial risks can be sub-classified into market risk and credit risk which banks are especially more concerned about. Non-financial risks are security risk, operational risk, legal risk, strategic risk, network risk, transaction fraud risk, reputation risk, non-financial risks, among others. Risk management can be achieved internally as well as externally. Effective risk management in the e-business should be based on the framework as follows: first, the risk management should be consistent with the corporate long term strategy, second, it should be equipped with well specified procedures, third, it needs to be integrated rather than independently addressed, fourth, internal and external management should be weighed in terms of cost and benefit. While this paper attempt to provide an insight into the e-business risk, additional effort should be exercised to develop more formal model to measure the relevant risks, along with effective risk management methods. Key Work : e-business risk, financial risk, non-financial risks,non-financial risks
With the super-high speed internet network that was established at the end of 1990's, computers have emerged as the most common appliance. Other electronic devices, such as cellular phones and digital cameras are also being rapidly integrated into a sophisticated society. Now, most people own multiple computers, whether obvious or not. Maintenance of computers has also become easier. Based on such infra, the government announced IT 839 project, and it has a plan to construct a home-network system to 10 million houses by the year 2007. In addition, the development of ubiquitous industry is in rapid movement under the leadership of japan and america in the world. Therefore, the exhibition space for ubiquitous and its system management will become a reality. In order for the successful design of such ubiquitous space, testing space is necessary at the planning level, which requires careful simulation. However, the advance building of Mockup space in equivalent scale would be impossible due to time and money constraints. For example, many foreign companies strive to be the first in suggesting ubiquitous testing concepts, however, such testing houses are for their business promotion not a testing space for a particular building. This study suggests the possibility of creating a computational exhibition scenario for Ubiquitous using virtual reality media that substitute Mockup space. This method can be developed into a future virtual model, which can substitute a real testing model. The space of Ubiquitous and virtual reality defines Ubiquitous facility unit into PROTO Node of VRML by using the common feature called object-oriented interaction. It focuses on the connection of network in space to Routing of VRML and suggests methods to transfer several virtual scenarios into Routing Diagram of VRML. Through the development of effective methodology of such Ubiquitous space plan, we expect more scientifically applied virtual reality simulation and the development of an ideal Ubiquitous construction.
The objective of this study is to analyze various risks which may arise in managing hedge funds and to further derive out effective risk management methods of those risks. From the global perspective, hedge funds were introduced decades ago and have been quite well advanced in the financial fields. However, unique aspects of hedge funds in the nonlinear and nonnormal payoffs have incurred many failures as well. Compared with a long history of hedge funds in the developed financial markets, Korea began to allow hedge funds to float in the markets only from 2011. Since the introduction of hedge funds in Korea, the size and variety have been increased significantly, even still far behind those of the advanced countries. However, since many limits and regulations on hedge fund industry are about to be lifted and relaxed from October 2015, numerous asset management firms are planning to jump in this market. As an investment vehicle, new opportunities in this sector could be accompanied by many new and unseen risks. This study maps out various risks associated with hedge funds such as market risk, credit risk, liquidity risk, operational risk, reputation risk, and other risks depending upon the styles and strategies of hedge funds. Then various risk measures are compared and evaluated. Finally, it offers some effective risk management methods.