RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 사이클 모사 프로그램을 이용한 대체냉매 냉동공조 시스템의 열역학적 해석

        박량한,김영재 한국공업화학회 2004 응용화학 Vol.8 No.2

        The system air-conditioner, which has one outdoor unit connecting several indoor unit units, can provide more energy saving and better environmental conditions than the conventional air-conditioning systems. But it is difficult to experimentally analyze behaviors of system air-conditioners due to various load conditions and combinations of indoor units. Therefore, it is important to develop a cycle simulation program for predicting the performance of system air-conditioners without complex experiments. The cycle simulation program for system air-conditioners consists of several subroutines for simulating indoor unit, outdoor unit, compressor, and expansion devices, and for estimating the thermodynamic and transport properties of the refrigerants and moist air. It was programmed with Digital Visual Fortran for the main simulation code and Visual Basic for the graphic user interface.

      • 프리스트레스트 콘크리트 橋梁의 解析 및 設計自動化

        金亮均,李準熙,崔正鎬,申鉉穆 成均館大學校 科學技術硏究所 1995 論文集 Vol.46 No.2

        Computer programs called "PCBRG" and "PCPST' were developed to analyze and design the prestressed concrete bridge. PCBRG is a structural analysis program which can determine the member forces, displacements and adaptable area of tendon by iteration method. PCPST is a post-processor for design. It enables design variables verified and the results of analysis (stress, member force and displacement, etc) are presented in the screen. Also the shear force and bending strength by the deformation compatibility method were checked.

      • KCI등재

        전이지대 방언의 변이 양상 고찰 -서남방언과 동남방언의 접경지를 중심으로-

        위평량 ( Wi Pyeong-ryang ) 한국방언학회 2021 방언학 Vol.- No.33

        본고에서는 서남방언과 동남방언의 접경지에 분포하는 변이형들을 접촉과 변이의 정도를 따라서 3가지 형태로 분류하여 정리하여 보았다. 1) 단어, 음절 단위의 차용과 변이(병렬, 혼효), 2) 음소 단위의 차용과 변이(자음, 모음 차용), 3) 제3유형으로의 변이 가능성을 살펴볼 것이다. 이 중 제3유형의 변이형들은 방언의 접촉과정에서 나타날 수 있는 ‘아래아(ㆍ) 변화의 방향’, ‘자음의 충돌과 변화’ 등에 대한 새로운 시각을 제시해 줄 수 있을 것이다. 그리고 만약 이러한 결과가 접촉의 과정에서 나타나는 변이의 모습으로 타당성을 가질 수 있다면 다른 방언 접경지의 수많은 변이형들을 재조명해 볼 수 있을 것이며, 다양한 환경에서 나타나는 국어의 음운변화 과정도 예측해 볼 수 있지 않을까 생각한다. I tried to find(prove) that any variation, which takes place when one dialect comes in contact with the other, does not take forms randomly but to any extent with direction and rules in Wi Pyeong-ryang(2005). And so I will confirm again that any variation keeps the head of the base of the former word and permits the tail of the other word depending upon the extent(degree) of each other’s influence through the distribution of ‘galkwi’(‘fork’) word forms. However, the causes of any variation are so varied and difficult to predict that any variation is varied and complex. It is difficult to conclude whether this aspect is the result of the contact of two dialects or the area’s particular aspects of the language of the area in question. This work will investigate(study) a lot of variations of the border lines of Jeallado and Gyongsangdo. These areas show the difference of west-southern dialect and east-southern dialect. The types of variation of these areas are 1) borrowing and variation of a word or a syllable 2) borrowing and variation of a phoneme (consonant, vowel borrowing) 3) the possibility of variation to the third type. I don’t jump to a conclusion that the new types, which are assumed to be the variations of the third type, resulted from the contact of the dialects. I will analyze these types based on the viewpoint of contact dialects. I will consider the possibility that we will predict the process of Korean phonologic changes if these changes are from the process of contact. Though this viewpoint is farfetched, I give(show) you(the readers) the chance of scrutinizing the reality of the variation of the contact areas.

      • KCI등재

        AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS

        Ryang, Yong Joon The Kangwon-Kyungki Mathematical Society 1996 한국수학논문집 Vol.4 No.1

        The optimization problems with quadratic constraints often appear in various fields such as network flows and computer tomography. In this paper, we propose an algorithm for solving those problems and prove the convergence of the proposed algorithm.

      • KCI등재

        Expression on Echinostoma hortense Infection Manifestation on the Cytokine of the Splenocytes of BALB/c and C3H/HeN Mice

        Ryang, Yong-Suk,Cho, Yoon-Kyung,IM, Jee-Aee,Lee, Kyu-Je,Kim, Insik,Sung, Ho-Joong THE KOREAN SOCIETY FOR BIOMEDICAL LABORATORY SCIEN 2004 Journal of biomedical laboratory sciences Vol.10 No.3

        This experiment was performed to examine the in vitro and in vivo affects of the two daerent haplotype strains of mice, BALB/c and C3H/HeN infected with Echinostoma hortense, and the manifestation of the profiles of cytokine in the splenocytes. In the in vitro experiment, the two mice's splenocytes were divided and stimulated with antigen of crude extracts and the antigen of excretory and secretory products of an adult warm and the manifestation of cytokine mRNA was verified with RT-PCR. As a result, the two different strains of mice both strongly manifested the Th2 cytokine rather than the Thl cytokine and in the case of the Th2 cytokine, the BALB/c mice manifested more strongly than the C3WHeN mice. In the experiment using the ELISA method, the protein cytokine mamfestation had the same result as the mRNA experiment. In the in vivo experiment, the mice was infected via oral route with the metacercaria of the Echinostoma hortense and the manifestation of cytokine was verifkd by RT-PCR and ELISA and the results were the same as the in vitro experiment. Therefore, in the two strains of BALBk and C3H/HeN, the C3H/HeN showed a higher susceptivity to the Echinostoma hortense.

      • KCI등재

        Contrasting basin fills in a strike-slip setting, Eumsung Basin(Cretaceous), Korea

        Ryang, W.H 한국지질과학협의회 2003 Geosciences Journal Vol.7 No.3

        In a strike-slip setting, depositional history of mar-ginal and central basins depends on the basin formation and basi-nal fault movements. The Eumsung Basin contains contrastingbasin fils according to marginal setings. The southeastern part ofthe basin forms sequential development of alluvial/lacustrine sys-tems along transform margin, and the southwestern part consti-tutes synchronous development of alluvial-to-lacustrine systems inpull-apart margin. Along the basin margins and toward the basincenter, both sequential and synchronous developments of the allu-vial and lacustrine systems have filed basinal accommodationspaces created by pull-apart opening. The formative processes ofthe basin were caused by the strike-slip fault movements and theaccompanying changes in drainage network along the basin mar-gin. The overall development patterns of the depositional systemsconform to the sinistral strike-slip fault activation during theEarly Cretaceous.

      • 휴리스틱 사용성 평가방법을 사용한 컴퓨터 보안의 사용자 인식에 대한 연구

        Ryang-Hee Kim,Young-Guk Kwon,Kee-Sam Jeong 대한인간공학회 2012 대한인간공학회 학술대회논문집 Vol.2012 No.11

        Objective: The aim of this study is to study user awareness of the computer security using selected heuristic usability method. There is no difference in age groups for awareness of computer security. Background: Currently, the networking computer system has been used in supplying electric power, opening facility of dam, web-surfing, air defense weapon of military, weather prediction and national security. There has been a leaking of personal information from a major portal site by the hackers. The victims’ personal information is used for crimes, such as “Illegally opening an account”, or “sending Spam”. Method: We collected 137 usability principles from previous literatures, including Nielsen (1994)`s checklist, screened a total of 34 usability principles among them in terms of tangible user interface main properties, and refined twenty five usability principles. The selected usability principles are classified systematically using statistical method, T-test and Principle Components Analysis (PCA) using Factor Analysis. 196 subjects (Groups: 20-40’s, 40-70’s) were divided into two groups: Adolescence group (N: 108, Female; 54, Male; 54), Senior-age group (N: 88, Female; 44, Male; 44). Results: As a result, 25 usability principles are categorized into 5 groups according to their correlations and we named them respectively (1) User Interaction-support, (2) User Cognitive-support (3) User Performance-support, (4) User Satisfaction-support, (5) User Physicality principles, as usability checklist items are produced a 5-point Likert scale. Conclusion: The result of T-teat showed that users" awareness of computer security groups were statistically significantly different between Adolescence group and Senior-age group (**p<.01). Application: We evaluated this users" awareness of computer security system using checklists which is a one of currently available tangible user interface prototype, and could suggest 25 usability items for users" awareness of computer security system for the Aged.

      • SCIESCOPUSKCI등재

        A METHOD USING PARAMETRIC APPROACH WITH QUASINEWTON METHOD FOR CONSTRAINED OPTIMIZATION

        Ryang, Yong-Joon,Kim, Won-Serk Korean Mathematical Society 1989 대한수학회보 Vol.26 No.2

        This paper proposes a deformation method for solving practical nonlinear programming problems. Utilizing the nonlinear parametric programming technique with Quasi-Newton method [6,7], the method solves the problem by imbedding it into a suitable one-parameter family of problems. The approach discussed in this paper was originally developed with the aim of solving a system of structural optimization problems with frequently appears in various kind of engineering design. It is assumed that we have to solve more than one structural problem of the same type. It an optimal solution of one of these problems is available, then the optimal solutions of thel other problems can be easily obtained by using this known problem and its optimal solution as the initial problem of our parametric method. The method of nonlinear programming does not generally converge to the optimal solution from an arbitrary starting point if the initial estimate is not sufficiently close to the solution. On the other hand, the deformation method described in this paper is advantageous in that it is likely to obtain the optimal solution every if the initial point is not necessarily in a small neighborhood of the solution. the Jacobian matrix of the iteration formula has the special structural features [2, 3]. Sectioon 2 describes nonlinear parametric programming problem imbeded into a one-parameter family of problems. In Section 3 the iteration formulas for one-parameter are developed. Section 4 discusses parametric approach for Quasi-Newton method and gives algorithm for finding the optimal solution.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼