• Title/Summary/Keyword: 응용계산능력

Search Result 104, Processing Time 0.026 seconds

Convergence Study on Ability and Accuracy in Drug Dose Calculations of Nursing Students (간호학생의 약물용량계산능력과 정확도에 관한 융합적 연구)

  • Jung, In-Sook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.123-131
    • /
    • 2017
  • This study is to find the weaknesses in drug dose calculations of nursing students by analyzing their general characteristics, confidence(C), performances in classes(PC) and exam sheets of drug dose calculations. The data were analyzed using SPSS 19.0. There was no significant difference between male and female students in simple calculation ability(SCA), but male students' mean scores were higher in applied calculation ability(ACA) and accuracy on calculation(AC). There were no significant differences in calculation abilities according to high school departments. And students were weak in questions which are needed ACA. The explanation rate of C on PC and PC on AC were 4.2% and 3.2% respectively, so there were weak positive effects from C to PC, and PC to AC. This study suggests that there is a need to develop and implement an intervention program according to students' abilities to increase AC, C, and PC by studying math on an ongoing basis. This study needs to be cautious in generalizing, because the data set was limited to nursing students from one university.

Analysis of Computer Vision Application for CGRA Mapping : SIFT (재구성형 프로세서 맵핑을 위한 컴퓨터 비전 응용 분석 : SIFT)

  • Heo, Ingoo;Kim, Yongjoo;Lee, Jinyong;Cho, Yeongpil;Paek, Yunheung;Ko, Kwangman
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.5-8
    • /
    • 2011
  • 최근 영상이나 이미지로부터 사용자가 원하는 정보를 추출해 내고 재구성 하는 영상 인식, 증강 현실 등의 컴퓨터 비전(Computer Vision) 응용들이 각광을 받고 있다. 이러한 컴퓨터 비전 응용들은 그 동안 많은 알고리즘들의 연구를 통해 꾸준히 개선되고 향상되어 왔으나, 많은 계산량을 요구하기 때문에 임베디드 시스템에서는 널리 쓰이기 힘들었다. 하지만 최근 들어, 스마트폰 등의 모바일 기기에서의 계산 처리 능력이 향상 되고, 소비자 수요가 증가하면서, 이러한 컴퓨터 비전 응용은 점점 모바일 기기에서 널리 쓰이게 되고 있다. 하지만, 여전히 이러한 컴퓨터 응용을 수행하기 위한 계산양은 부족하기 때문에, 충분한 연산량을 제공하기 위한 방법론들이 다양하게 제시되고 있다. 본 논문에서는 이러한 컴퓨터 응용을 위한 프로세서 구조로서 재구성형 프로세서(Reconfigurable Architecture)를 제안한다. 컴퓨터 비전 응용 중 사물 인식 분야에서 널리 쓰이는 SIFT(Scale Invariant Feature Transformation)을 분석하고 이를 재구성형 프로세서에 맵핑하여 성능 향상을 꾀하였다. SIFT의 주요 커널들을 재구성형 프로세서 맵핑한 결과 최소 6.5배에서 최대 9.2배의 성능 향상을 이룰 수 있었다.

Develoment of A New 16 Bit Microcomputer for Control and Measurement (16비트 마이크로 프로세서를 이용한 계측.제어용 컴퓨터에 관한 연구)

  • 박상길
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.23 no.2
    • /
    • pp.66-71
    • /
    • 1987
  • Computer is the best versatile machine of the human creatures. Computers are not only applicated in mathematics but also in operation part of control mechanism and measuring system. Commercial computers have many sophisticated pheripherals, therefore they have many restrictions in practical applications such as control or measurement. The author designed a new simple computer that has essentially required component.

  • PDF

A Design of Analyzing effects of Distance between a mobile device and Cloudlet (모바일 장치와 구름을 사이에 거리의 효과 분석설계)

  • Eric, Niyonsaba;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2671-2676
    • /
    • 2015
  • Nowadays, Mobile devices are now capable of supporting a wide range of applications. Unfortunately, some of applications demand an ever increasing computational power and mobile devices have limited resources due to their constraints, such as low processing power, limited memory, unpredictable connectivity, and limited battery life. To deal with mobile devices' constraints, researchers envision extending cloud computing services to mobile devices using virtualization techniques to shift the workload from mobile devices to a powerful computational infrastructure. Those techniques consist of migrating resource-intensive computations from a mobile device to the resource-rich cloud, or server (called nearby infrastructure). In this paper, we want to highlight on cloudlet architecture (nearby infrastructure with mobile devices), its functioning and in our future work, analyze effects of distance between cloudlet and mobile devices.

RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester (서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘)

  • Kwon, Moon-Sang;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.299-306
    • /
    • 2002
  • Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.

A Theoretic Foundation of Imprecise Computation (근사값 계산 방안에 대한 이론적 연구)

  • Park, Dong-Won
    • The Journal of Natural Sciences
    • /
    • v.7
    • /
    • pp.115-120
    • /
    • 1995
  • Imprecise computation has been suggested as a promising model of real-time computing in order to deal with timing constraints imposed by the environment. However, the theoretical foundation of the technique has not been fully explored. To address this, a decision-theoretic foundation of imprecise computation is proposed. The main benefit of such a treatment is that it enables the qualitative assumptions underlying imprecise computation techniques to be explicitly stated in a formal way. The theoretical foundation laid out in this paper, hence, will not only enable the justification of using imprecise computation techniques for a real-time application, but will also facilitate the development of extended techniques for more complexs real-time systems.

  • PDF

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.

Analysis of Energy Consumption and Processing Delay of Wireless Sensor Networks according to the Characteristic of Applications (응용프로그램의 특성에 따른 무선센서 네트워크의 에너지 소모와 처리 지연 분석)

  • Park, Chong Myung;Han, Young Tak;Jeon, Soobin;Jung, Inbum
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.399-407
    • /
    • 2015
  • Wireless sensor networks are used for data collection and processing from the surrounding environment for various applications. Since wireless sensor nodes operate on low computing power, restrictive battery capacity, and low network bandwidth, their architecture model has greatly affected the performance of applications. If applications have high computation complexity or require the real-time processing, the centralized architecture in wireless sensor networks have a delay in data processing. Otherwise, if applications only performed simple data collection for long period, the distributed architecture wasted battery energy in wireless sensors. In this paper, the energy consumption and processing delay were analyzed in centralized and distributed sensor networks. In addition, we proposed a new hybrid architecture for wireless sensor networks. According to the characteristic of applications, the proposed method had the optimal number of wireless sensors in wireless sensor networks.

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network (무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구)

  • Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-273
    • /
    • 2008
  • Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.

구조역학 분야에서의 초병렬 컴퓨터의 활용

  • 조진우;최성훈
    • Computational Structural Engineering
    • /
    • v.9 no.4
    • /
    • pp.5-10
    • /
    • 1996
  • 본 고에서는 paragon에서 DYNA3D 결과의 검증과 효율성을 점검하였는데, 적절한 CPU 개수를 선택하여 계산할 때는 Cray에 비하여 더욱 빠른 시간 내에 해석결과를 얻을 수 있을 뿐만 아니라 본 고에서 언급되지는 않았지만 Cray에서는 풀 수 없는 아주 큰 memory를 요구하는 문제도 paragon의 DYNA3D를 이용하면 급속히 확산될 추세이며 이에 따라 기존의 응용 소프트웨어의 병렬화는 필연적인 결과라고 생각된다. 따라서 병렬컴퓨터 및 병렬 프로그래밍에 대한 이해를 통하여 미래의 시뮬레이션 분야에서 앞서갈 수 있는 능력을 갖추는 노력이 절실히 요구된다.

  • PDF