• Title/Summary/Keyword: 절차적 생성

Search Result 411, Processing Time 0.032 seconds

An Analysis of Elementary School Students' Interpretation of Data Characteristics by Cognitive Style (초등학생의 인지양식에 따른 자료해석 특성 분석)

  • Lim, Sung-Man;Son, Hee-Jung;Yang, Il-Ho
    • Journal of The Korean Association For Science Education
    • /
    • v.31 no.1
    • /
    • pp.78-98
    • /
    • 2011
  • The purpose of this study was to analyze elementary school students' interpretation of data characteristics by cognitive style. Participants were elementary students in sixth grade who can use integrated inquiry process skills. The students were divided into two groups, analytic cognitive style and wholistic cognitive style according to their response to Cognitive Style Analysis. They performed scientific interpretation of data activity. To collect data for this study, participants recorded the result on scientific interpretation of data activity paper and researcher recorded the situation on videotape and interviewed with participants after the end of interpretation of data to get additional data. And the findings of this study were as follows: First, the study analyzed interpretation of data characteristics by the operator regarding different situations of interpreting data according to cognitive style. For example, in the intermediate state, analytic-cognitive style students showed high achievement in identifying variables, and wholistic-cognitive style students were active in using prior knowledge to interpret data. Second, the result of analysis on the direction of interpreting data and preference for data types in interpreting data activities according to cognitive style are as follows: Wholistic-cognitive style students showed relatively high perception of information through the top-down approach. On the other hand, analytic-cognitive style students usually used the bottom-up approach gradually expanding detailed information to the scientific question-related answer and showed a preference data of the table type. Through the result, this study aimed to help establish a data interpretation strategy for learners to solve problems based on understanding of interpretation of data characteristics according to learners' cognitive style, and purposed the instruction design suggesting the data requiring various data interpretation strategies to develop learners' data interpretation ability.

Development and Application of Mode II Fracture Toughness Test Method Using Rock Core Specimen (시추코어를 이용한 암석의 mode II 파괴인성 시험법 개발과 적용)

  • Jung, Yong-Bok;Park, Eui-Seob;Kim, Hyunwoo
    • Tunnel and Underground Space
    • /
    • v.26 no.5
    • /
    • pp.396-408
    • /
    • 2016
  • Rock fracture mechanics has been widely applied to various fields of rock and civil engineering. But most researches covered mode I behavior, though mode II behavior is dominant in rock engineering. Until now, there is only one ISRM suggested method for mode II toughness of rock. A new SCC (Short Core in Compression) mode II toughness test method was developed considering 1) application of confining pressure, 2) easiness of notch creation, 3) utilization of existing equipment, 4) simple test procedure. The stress intensity factors were determined by 3D finite element method considering line and distributed loading conditions. The tests with granite specimens were carried out using MTS 815 rock test system with a loading rate of 0.002 mm/s. The mean value of mode II fracture toughness of granite showed $2.33MPa{\sqrt{m}}$. Mode I toughness of the same granite was $1.12MPa{\sqrt{m}}$, determined by Brazilian disk test and $K_{IIC}/K_{IC}=2.08$. The smooth fracture surface with rock powder formation also supported mode II behavior of SCC method. The SCC method can be used for the determination of mode II fracture toughness of rocks based on the current results.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF

A Study on the Pile Behaviour Adjacent to Tunnel Using Photo Imaging Process and Numerical Analysis (Photo Imaging Process 기법 및 수치해석을 이용한 터널주변 파일기초거동에 대한 연구)

  • Lee Yong-Joo
    • Journal of the Korean Geotechnical Society
    • /
    • v.21 no.9
    • /
    • pp.87-102
    • /
    • 2005
  • In the congested urban areas, tunnelling close to existing structures or services often occurs due to the lack of surface space so that tunnelling-induced ground movements may cause a serious damage to the adjacent structures. This study focused on the two dimensional laboratory model pile-soil-tunnelling interaction tests using a close range photogrammetric technique. Testing equipments and procedures were Introduced, particularly features of aluminium rods regarded as the frictional granular material. The experimental result showed that the photo imaging process by the VMS and EngVis programs proved to be a useful tool in measuring the pile tip movements during the tunnelling. Consequently, the normalised pile tip movement data for the influence zones can be generated by the laboratory model tests using the Photogrammetric technique. This study presents influence zones associated with the normalized pile tip settlements due to tunnelling in the cohesionless material. The influence zones were Identified by both a laboratory model test and a numerical analysis. The normalized pile tip movements from the model test were in good agreement with the numerical analysis result. The influence zones proposed in this study could be used to decide the reasonable location of tunnel construction in the planning stage. However, the scale of model pile and model tunnel sizes must be carefully adjusted as real ones for practical application considering the ground conditions at a given site.

Vegetation Structure and Dynamics on Bars in Streams with Different Stream Bed Substrates (하상재료가 다른 하천의 하중도 환경에서 식생의 구조 및 동태)

  • Lee, Chang-Seok;Cho, Yong-Chan;Oh, Woo-Seok;Park, Sung-Ae;Seol, Eun-Sil
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.1140-1144
    • /
    • 2007
  • 모래하천과 자갈하천의 하중도에 성립한 식생을 분석하여 하천복원과 복원된 하천의 사후 관리에서 요구되는 생태정보를 구축하였다. 모래하천의 하중도에는 버드나무군락, 물억새군락, 산조풀군락, 속속이풀군락, 큰개여뀌군락, 밭뚝외풀군락 등이 성립하였다. 이러한 식생자료를 서열법으로 처리한 결과, 식물의 배열은 천이경향을 반영하였고, 하중도의 미지형에 의해 결정된 지하수위 높이가 천이단계를 지배하는 것으로 판단되었다. 모래하천인 용수천의 하중도에서 상류로부터 하류를 향해 식생의 분포는 버드나무군락-물억새군락-산조풀군락-속속이풀군락의 순서를 보였다. 우점종의 생활형에 따라 이들을 구분하면, 이 순서는 목본 식물군락-다년생 식물군락-1년생 식물군락의 순서를 보였다. 이러한 식생의 배열로부터 하중도는 하류 방향으로 새로 생성되고 있음을 알 수 있었다. 자갈하천의 하중도에는 발달단계가 다른 세 개의 소나무군락과 초지가 성립하였다. 소나무군락은 유령림, 성숙목과 유령목이 혼합된 복층림, 그리고 성숙림으로 이루어졌다. 초지는 쑥, 달뿌리풀, 환삼덩굴, 소나무 실생, 황철나무 등이 산재하는 밀도가 낮은 식생으로 이루어졌다. 이러한 식생자료를 서열법으로 처리한 결과 여기에서도 식생의 배열은 천이경향을 반영하였다. 천이단계를 지배하는 요인은 홍수에 밀려온 자갈의 피복율로 나타났다. 상류로부터 하류를 향해 식생의 분포는 초지, 소나무 유령림, 소나무 복층림 및 소나무 성숙림의 순서를 보였다. 이러한 식생의 배열로부터 하중도는 상류방향으로 새로 성립하고 있음을 알 수 있었다.변지역에 거주하는 주민의 역할이 중요하며, 이에 따라 보 철거 선정 체계는 보 철거를 위해서 보 주변 지역 거주민을 설득하며, 하천의 환경 개선을 위한 합리적인 대안 제시를 목적으로 하고 있다. 선정 체계를 바탕으로 주민 협의 및 대안 제시를 통해 결정된 대상 보는 선정 체계 안에서 보 철거 영향 판단 절차에 따라서 보 철거로 인한 수문, 수리, 지형, 수질, 생태 영향을 판단하게 되며, 이와 더불어 사회 경제적인 영향을 평가하게 된다. 평가결과에 따라서 보를 완전히 철거하거나 다른 대안을 고려하여 보를 부분적으로 철거하거나 개량하게 된다.곳으로 1/3의 자기 생산을 담당하고 있었다. $\ulcorner$경상도지리지$\lrcorner$(慶尙道地理志)에는 $\ulcorner$세종실록$\lrcorner$(世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와 동년대에 동일한 목적으로 찬술되었음을 알 수 있다. $\ulcorner$경상도실록지리지$\lrcorner$(慶尙道實錄地理志)에는 $\ulcorner$세종실록$\lrcorner$(世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와의 비교를 해보면 상 중 하품의 통합 9개소가 삭제되어 있고, $\ulcorner$동국여지승람$

  • PDF

An Environmental Analysis of Candidate SBAS Reference Station (위성기반 보강시스템 기준국 후보지의 환경 분석)

  • Han, Younghoon;Park, Sul Gee;Lee, Sangheon;Park, Sang Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.685-688
    • /
    • 2016
  • SBAS(Satellite Based Augmentation System) broadcasts the correction message based on satellite communication to improve the positioning accuracy of GNSS user. For this reason, SBAS is actively being utilized on navigation part. To apply SBAS to navigation part, it should satisfy not only accuracy but also integrity, continuity, availability, coverage requirements and so on. Since SBAS reference station is the base infrastructure of SBAS, it is the main factor to determine the environment, position, and geometry of reference stations to achieve SBAS service performance. Therefore, a site environmental analysis should be performed prior to the selection of SBAS reference station. In this paper, it performs the environmental analysis of NDGPS(Nationwide Differential GPS) reference station sites on the premise that SBAS reference station will be co-operated in the same site of NDGPS operated by MOF(Ministry of Oceans and Fisheries). The environmental analysis is conducted as carrying out the visibility analysis of GPS satellite and interference analysis. This paper also presents the brief procedures and requirements for site survey of SBAS reference station.

  • PDF

Lever Arm Compensation of Reference Trajectory for Flight Performance Evaluation of DGPS/INS installed on Aircraft (항공기에 탑재된 DGPS/INS 복합항법 장치의 비행 시험 성능 평가를 위한 기준궤적의 Lever Arm 보정)

  • Park, Ji-Hee;Lee, Seong-Woo;Park, Deok-Bae;Shin, Dong-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.12
    • /
    • pp.1086-1092
    • /
    • 2012
  • It has been studied for DGPS/INS(Differential Global Positioning System/Inertial Navigation System) to offer the more precise and reliable navigation data with the aviation industry development. The flight performance evaluation of navigation system is very significant because the reliability of navigation data directly affect the safety of aircraft. Especially, the high-level navigation system, as DGPS/INS, need more precise flight performance evaluation method. The performance analysis is performed by comparing between the DGPS/INS navigation data and reference trajectory which is more precise than DGPS/INS. The GPS receiver, which is capable of post-processed CDGPS(Carrier-phase DGPS) method, can be used as reference system. Generally, the DGPS/INS is estimated the CG(Center of Gravity) point of aircraft while the reference system is output the position of GPS antenna which is mounted on the outside of aircraft. For this reason, estimated error between DGPS/INS and reference system will include the error due to lever arm. In order to more precise performance evaluation, it is needed to compensate the lever arm. This paper presents procedure and result of flight test which includes lever arm compensation in order to verify reliability and performance of DGPS/INS more precisely.

The Analysis and Implication of Link Integrity of Korean Public Institution Website from a Web Usability Perspective (웹 사용성 관점에서 공공기관 웹 사이트의 링크 유효성 분석 및 개선 과제)

  • Moon, Hyun Ju;Kim, Suk Il
    • 재활복지
    • /
    • v.17 no.4
    • /
    • pp.291-309
    • /
    • 2013
  • Web usability is utilized as a standard for constructing and managing website to be useful by people of all abilities and disabilities. Link integrity is one of main criteria for web usability evaluation. Links that are found to be broken or pointing to irrelevant information lead gradual degradation of link integrity over time. This study has conducted investigation for link integrity of Korean public institution website. Among 49 website that are accessible by an automatic link checker software, 91.8% of the website has more than one broken links. Also average number of broken links is 50.5 that is 0.33% of the number of links. 29 websites consist of internal broken links. And 22 website do not provide any information on the missing page. Broken links enlower website confidence by reducing web usability as well as they prohibit web search engine not to provide information on the website. Therefore, web developers and managers need to be aware of importance of link integrity and prohibit web usability degradation by performing link validation as a web management task or periodically.

Development of a Fault-tolerant IoT System Based on the EVENODD Method (EVENODD 방법 기반 결함허용 사물인터넷 시스템 개발)

  • Woo, Min-Woo;Park, KeeHyun;An, Donghyeok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.263-272
    • /
    • 2017
  • The concept of Internet of Things (IoT) has been increasingly popular these days, and its areas of application have been broadened. However, if the data stored in an IoT system is damaged and cannot be recovered, our society would suffer considerable damages and chaos. Thus far, most of the studies on fault-tolerance have been focused on computer systems, and there has not been much research on fault-tolerance for IoT systems. In this study, therefore, a fault-tolerance method in IoT environments is proposed. In other words, based on the EVENODD method, one of the traditional fault-tolerance methods, a fault-tolerance storage and recovery method for the data stored in the IoT server is proposed, and the method is implemented on an oneM2M IoT system. The fault-tolerance method proposed in this paper consists of two phases - fault-tolerant data storage and recovery. In the fault-tolerant data storage phase, some F-T gateways are designated and fault-tolerant data are distributed in the F-T gateways' storage using the EVENODD method. In the fault-tolerant recovery phase, the IoT server initiates the recovery procedure after it receives fault-tolerant data from non-faulty F-T gateways. In other words, an EVENODD array is reconstructed and received data are merged to obtain the original data.