272 research outputs found
Secondary predication and default case
This paper compares secondary predication constructions (including small clause complements, resultatives, and/or depictives) in English and Korean and argues that these two typologically different languages employ different modes of satisfying the Case Filter (Chomsky 1981) with regard to the Case of the subjects of secondary predication constructions. More specifically, we argue that the subject of the secondary predicate in English is Accusative Case-marked by the higher governing verb, while that in Korean is Nominative Case-marked by default. Evidence for default Nominative Case will be provided from Korean and other languages
Stalin's Cold War Strategy, 1945-1953
Today, the post-Cold War world order based on the US unipolar supremacy is no longer a main paradigm in world affairs. Militarily, the US number one global power has still no questions. However, other powers have risen economically, diplomatically and militarily. China challenges a post-Second World War order, such as the Washington consensus, and Russia challenges a post-Cold War order, such as a recent Ukraine crisis. However, potential nuclear states, including Iran and North Korea, challenge nuclear world order that the US set and radical Islamic terrorist groups, including so-called Islamic State, challenges the US hegemony in Middle East. Uncertainty about a new world order has increased because of these diverse international events which challenge the US hegemony. This uncertain world situation was similar to the post-Second World War. After the Cold War, the winner was no question. However, multiple winners in 1945 led an uncertainty about a new world order. Studies on the post Second World War world situations are useful historical lessons if we look at today’s uncertain world order. This dissertation examines Stalin’s Cold War strategy from 1945 to 1953 with a new interpretative perspective. I argue that Stalin actively used new strategic situations for the Soviet Union’s interest. Stalin did not hesitate to manipulate his junior partners who paid prices for enhancing a security of the Soviet Union. To the Kremlin, foreign communist countries were useful tools and means as security buffer zones, not revolutionary brothers. Scholars often explain that Stalin was a passionate ideologue based on his speeches and words. However, I argue that Stalin’s Cold War strategy was fundamentally based on his realistic calculation, not a revolutionary ideology. Stalin was not his political rival, Leon Trotsky who was an idealistic romanticist and believed the third world permanent revolutions. Instead, Stalin was a Machiavellian realist and a cold calculator, especially in a foreign policy realm
DNA multi-bit non-volatile memory and bit-shifting operations using addressable electrode arrays and electric field-induced hybridization.
DNA has been employed to either store digital information or to perform parallel molecular computing. Relatively unexplored is the ability to combine DNA-based memory and logical operations in a single platform. Here, we show a DNA tri-level cell non-volatile memory system capable of parallel random-access writing of memory and bit shifting operations. A microchip with an array of individually addressable electrodes was employed to enable random access of the memory cells using electric fields. Three segments on a DNA template molecule were used to encode three data bits. Rapid writing of data bits was enabled by electric field-induced hybridization of fluorescently labeled complementary probes and the data bits were read by fluorescence imaging. We demonstrated the rapid parallel writing and reading of 8 (23) combinations of 3-bit memory data and bit shifting operations by electric field-induced strand displacement. Our system may find potential applications in DNA-based memory and computations
Computer Vision-Based Risk Assessment on Heterogeneous Mobile Network Operating Environments
In order to logically prioritize the urgent risks in the heterogeneous mobile network operating environment, we derive environmental factors that can reflect the characteristics of the heterogeneous network operating environment and present them as an improved security risk assessment formula. The prioritized risks derived through this improved risk assessment formula can visually express the severity of the risk by using computer vision. The purpose of this study was to derive environmental factors that can reflect the security control characteristics of various heterogeneous network operating environments and to apply them to security risk evaluation formulas to prioritize urgent risks and easily identify the degree of security risks. In the existing risk assessment formula, risk is calculated based on three indices: the importance of the asset, the vulnerability score, and the threat score. However, two problems were derived from the existing risk assessment. First, the existing risk assessment formula is insufficient to reflect the controlled environment characteristics of each network because the risk level is calculated based on individual assets. Second, if the same systems with the same purpose (same settings) are operated in different heterogeneous network operating environments, they are counted at the same risk level, and action cannot be prioritized quickly. To solve these problems, we propose an indicator called environmental factor (E), which is a combination of three indices. The three indices are "Network Diversity Index (NDI), network Zone Separation Index (ZSI) and Control Level Index (CLI)". NDI expressed the diversity of networks numerically. ZSI is a numerical expression of the complexity of the network zone. CLI is a numerical expression of the degree of network control level. Results of the study showed that the risk assessment formula applying the proposed risk assessment factors can quickly identify urgent risks and act quickly. In heterogeneous mobile network operating environment in which numerous systems are operated, really urgent risks among the risks calculated through the proposed risk assessment will be handled quickly and logically
Computer Vision-Based Risk Assessment on Heterogeneous Mobile Network Operating Environments
In order to logically prioritize the urgent risks in the heterogeneous mobile network operating environment, we derive environmental factors that can reflect the characteristics of the heterogeneous network operating environment and present them as an improved security risk assessment formula. The prioritized risks derived through this improved risk assessment formula can visually express the severity of the risk by using computer vision. The purpose of this study was to derive environmental factors that can reflect the security control characteristics of various heterogeneous network operating environments and to apply them to security risk evaluation formulas to prioritize urgent risks and easily identify the degree of security risks. In the existing risk assessment formula, risk is calculated based on three indices: the importance of the asset, the vulnerability score, and the threat score. However, two problems were derived from the existing risk assessment. First, the existing risk assessment formula is insufficient to reflect the controlled environment characteristics of each network because the risk level is calculated based on individual assets. Second, if the same systems with the same purpose (same settings) are operated in different heterogeneous network operating environments, they are counted at the same risk level, and action cannot be prioritized quickly. To solve these problems, we propose an indicator called environmental factor (E), which is a combination of three indices. The three indices are "Network Diversity Index (NDI), network Zone Separation Index (ZSI) and Control Level Index (CLI)". NDI expressed the diversity of networks numerically. ZSI is a numerical expression of the complexity of the network zone. CLI is a numerical expression of the degree of network control level. Results of the study showed that the risk assessment formula applying the proposed risk assessment factors can quickly identify urgent risks and act quickly. In heterogeneous mobile network operating environment in which numerous systems are operated, really urgent risks among the risks calculated through the proposed risk assessment will be handled quickly and logically
An Analysis of Pre-service Teachers' Learning Process in Programming Learning
As the importance of computing technology increases, computer science education is being actively implemented around the world. Because computer science education is being introduced into the curriculum, research on how to effectively teach programming (which is the core of automation) is actively underway. Although the importance of block-based programming languages has increased, most studies have focused on text-based programming languages. As interest in programming increases, block-based programming languages will be taught to a variety of audiences. Therefore, this study analyzed Code.org, which provides a development environment for block-based programming; this study then investigated the programming learning process of pre-service teachers, who used Code.org. Sixteen pre-service teachers participated in the study, and their learning processes were uncovered by analyzing their programming results. This suggests that pre-service teachers can learn sequential and necessary repetition without difficulty. However, the pre-service teachers failed to use the repetition block through abstraction. Besides, for While and Until, pre-service teachers did not understand the concept of repeating according to the condition. For Counter, pre-service teachers had difficulty repeating the use of variables. In the condition, pre-service teachers were not able to separate the command, which should be executed when the condition is True and when it is False. For Event, pre-service teachers had no problem utilizing the function, but they were not able to call the function with a parameter. Based on this, it was confirmed that a pre-service teacher can understand the principle of programming development in advance by understanding the abstraction, condition, and variable in the loop statement. In this study, there was a limit to practicing block-based programming language due to the platform’s low scalability. Future research should solve these problems and diversify the research subjects
Heuristic Algorithm for Virtual Link Configuration in AFDX Networks
REACTION 2014. 3rd International Workshop on Real-time and Distributed Computing in Emerging Applications. Rome, Italy. December 2nd, 2014.As the AFDX networks have been increasingly employed for airborne networks, much research works have been conducted to support real-time service in a deterministic way. However, since they assumed the preconfigured networks where all involved parameters were already determined, the impact of configuration algorithm is not well explored. To solve this problem, in this paper, we focus on how to reduce the required bandwidth by configuring virtual link which logically consists of at least one or more application flows. To achieve this, new heuristic algorithms have been proposed by applying well-known greedy approach while taking essential constraints of AFDX networks into account. To evaulate the performance of proposed scheme, diverse case studies for airborne application flows are concerned and their number of virtual links as well as required bandwidth are compared.This work was supported by Basic Science Research Program (NRF-2013R1A1A2A10004587) through the National Research Foundation of Korea (NRF) funded by the Ministry of Education and the MSIP(Ministry of Science, ICT & Future Planning), Korea, under the ”SW master’s course of a hiring contract” support program (NIPA-2014-HB301-14- 1014) supervised by the NIPA(National IT Industry Promotion Agency).Publicad
NATO’s New Mission: Keep America in, Russia Down, and China Out
NATO has been taking its lessons from the Euro-Atlantic area to prepare for contingencies in the Indo-Pacific
- …