• Title/Summary/Keyword: Information codes

Search Result 2,113, Processing Time 0.029 seconds

A Cost Estimation Technique using the PRICE S Model for Embedded Software in Weapon Systems (PRICE S 모델을 이용한 무기체계 내장형 소프트웨어 비용 추정 기법)

  • Shin, Eon-Hee;Kang, Sung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.717-724
    • /
    • 2006
  • The cost estimation of software is getting more important as the portion of software is increasing in acquiring weapon systems. However, the cost estimation of embedded software in a weapon system follows the cost estimation method for general purpose softwares and uses the PRICE S model as a tool. However, any validation result of the estimated cost through an evaluated software size is not well known. Hence, we propose an approach to estimate the cost through evaluating the embedded software site in weapon systems. In order to achieve our research goal, we evaluate the software size of using the line of codes and function points which are produced by the PRICE S model. Finally, we compare the estimated cost data the actual cost data provided by the production company. As a result, we propose an approach to estimate the size and the cost of embedded software in weapon systems which are not easy to estimate objectively. We also expect that the Proposed approach is used for the cost validation and negotiation in the acquisition of weapon systems in the future.

Efficient Evaluation of Path Expressions Using Connectivity of Nodes (노드의 연결성을 이용한 패스 표현의 효과적인 처리)

  • Lee, Tae-Gyeong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.337-344
    • /
    • 2002
  • Recently, there has been a lot of research on graph-type data because it can model seamless the application domains such as GIS, network, WWW, multimedia presentations etc., and domain in which the data sequence is important. In this paper, an efficient code system, called node code system, is proposed to evaluate paths of DAG in a multimedia presentation graph. The node code system assigns a unique binary string to each node of a graph. The comparison of node codes of two nodes tells the connectivity between the nodes without actual traversal of a graph. The method using the property of the node code system allows us to construct the paths between two nodes more efficiently than the method using conventional graph traversals. The algorithms to construct paths using the node code system are provided.

Constant Time RMESH Algorithm for Linear Translation of Linear Quadtrees (선형 사진트리의 선형이동을 위한 상수시간 RMESH 알고리즘)

  • Kim, Kyung-Hoon;Woo, Jin-Woon
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.207-214
    • /
    • 2003
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The linear translation is one of important operations in image processing, which moves the image by a given distance. In this paper, we present an algorithm to perform the linear translation of binary images represented by quadtrees, using three-dimensional $n{\times}n{\times}n$ processors on RMESH (Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of n${\times}$n${\times}$n RMESH.

A Study on Consciousness & Value of Sexuality of Elementary School Children (초등학교 학생들의 성 의식 및 가치관에 관한 연구)

  • Lee, Hae-Yun;Park, Young-Soo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.2 no.1
    • /
    • pp.53-65
    • /
    • 2001
  • The purposes of this study were to collect basic data on education of Sexuality(Health education) of consciousness & value of sexuality of elementary school children. 584,6th grade students in elementary school in Yong-In city were analysed and the results are as follow; 1. Knowledges of sexuality for children was at a average level, especially "physical change of puberty" and "sexual violence" were well recognized but "the physical characteristics of male & female" and "physiological phenomena of men" were less recognized. Attitudes of sexuality were positive for "relationship with partners" and "expression of mind". Practices of sexuality were at a low rate in the case of "shaking hands with partner" and "experience of sexual behavior". The Value of sexuality was at a high rates in the case of "the role of sex", "equality" & "self-identification", therefore students need good education of sexuality from childhood 2. Sexuality education of students increased knowledges of sexuality as a consciousness. There was no relationship between attitudes and pratices of sexuality. Educated children valued sexuality move highly than uneducated children. This result shows that education is needed with regard to both the knowledge and value of sexuality in a planned system. We need some program to provide more information on sexual attitudes and practices. 3. There was a high correlation between the consciousness of sexuality and value placed on it. As sexual awareness increases amongst students codes of morality develop Positive sexual attitudes served as good role models for sex. In particular positive sexual attitudes have a big effect on sexual values. In addition, as sexual awareness and attitude increase amongst students the role of sexual development. The elementary school phase sexual values are developed and determined. It is therefore an important phase.

  • PDF

Does a Higher Coronary Artery Bypass Graft Surgery Volume Always have a Low In-hospital Mortality Rate in Korea? (관상동맥우회로술 환자의 위험도에 따른 수술량과 병원내 사망의 관련성)

  • Lee, Kwang-Soo;Lee, Sang-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.39 no.1
    • /
    • pp.13-20
    • /
    • 2006
  • Objectives: To propose a risk-adjustment model with using insurance claims data and to analyze whether or not the outcomes of non-emergent and isolated coronary artery bypass graft surgery (CABG) differed between the low- and high-volume hospitals for the patients who are at different levels of surgical risk. Methods: This is a cross-sectional study that used the 2002 data of the national health insurance claims. The study data set included the patient level data as well as all the ICD-10 diagnosis and procedure codes that were recorded in the claims. The patient's biological, admission and comorbidity information were used in the risk-adjustment model. The risk factors were adjusted with the logistic regression model. The subjects were classified into five groups based on the predicted surgical risk: minimal (<0.5%), low (0.5% to 2%), moderate (2% to 5%), high (5% to 20%), and severe (=20%). The differences between the low- and high-volume hospitals were assessed in each of the five risk groups. Results: The final risk-adjustment model consisted of ten risk factors and these factors were found to have statistically significant effects on patient mortality. The C-statistic (0.83) and Hosmer-Lemeshow test ($x^2=6.92$, p=0.55) showed that the model's performance was good. A total of 30 low-volume hospitals (971 patients) and 4 high-volume hospitals (1,087 patients) were identified. Significant differences for the in-hospital mortality were found between the low- and high-volume hospitals for the high (21.6% vs. 7.2%, p=0.00) and severe (44.4% vs. 11.8%, p=0.00) risk patient groups. Conclusions: Good model performance showed that insurance claims data can be used for comparing hospital mortality after adjusting for the patients' risk. Negative correlation was existed between surgery volume and in-hospital mortality. However, only patients in high and severe risk groups had such a relationship.

A Study on Nutrition Composition Labeling and Nutrition Claim Practices for the Processed Foods (시판 가공식품의 영양성분 및 영양강조 표시 실태에 대한 연구)

  • 오세인;장영애
    • Korean journal of food and cookery science
    • /
    • v.20 no.1
    • /
    • pp.100-111
    • /
    • 2004
  • The purpose of this study was to investigate the status of current nutrition labeling on the packaging of the processed foods that provide consumers with a reliable and consistent source of information, which has been considered as a useful aid for food selection and a potent educational tool for nutrition in daily life. The 2,160 processed foods purchased at the supermarket on September, 2002, were divided by food category issued from the 2002 food codes and assessed in the terms of the nutrition composition labeling and nutrition claims. Nutrition composition labeling was found on 356 of the 2160 processed foods items. Milk and dairy products had 49.7% of nutrition composition labeling, which was the largest number among the food category. Tables were most frequently used as the type of nutrition composition labeling (79.8%). Nutrition composition including many different ways of expression, such as a table of nutrition composition, indication of nutrition composition, analysis table of nutrition composition and comparative table of nutrition composition, made frequent use of nutrition composition labeling titles (78.7%). The various unit of measures were use in the nutrition labeling of the processed foods, per l00g or 100$m\ell$ was the highest (44.6%) under the currently practiced nutrition labeling. The correct labeling standard with nutrient content and % RDA except energy, was used on 47.8% of labels, and those with only liability indication nutrient and liability indication nutrients plus discretion indication nutrients were 25.3 and 22.5% respectively. The processed foods with nutrition claims were 8.0% (172 items). Nutrition claims were divided in two ways: nutrient content claims and nutrient comparative claims. The most frequently used claims were contained in the former (44.4%) and more or plus in the latter case (16.3%). Ca was the most popular item as a nutrition claim nutrient (50.6%).

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

Scrambling Occurrence Frequency in HDB-3 in UTF-8 Coding of UNICODE Hangul Jamo (Unicode 한글낱자의 UTF-8 부호화에 따른 HDB-3 스크램블링 발생빈도)

  • Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.153-160
    • /
    • 2015
  • This paper has studied about the scrambling occurrence frequency in UTF-8 coding system for Unicode Hangul Jamo codes. The scrambling methode applied in the study is HDB-3 in AMI line coding that is international transmission standard. In the study, the source coding rule was applied to analysis the scrambling occurrence. The quantity of the scrambling occurrence was calculated by the number of times and frequency rate of the scrambling occurrence in Hangul Jamo and Compatibity Hangul Jamo. In the case of Hangul Jamo, the number of times and frequency rate in Unicode and UTF-8 were 24times, 52% and 148times, 228% respectively. In the case of Compatibility Hangul Jamo, that were 10times, 14% and 83times, 131% respectively. As a result, when Hangul Jamo and Compatibility Hangul Jamo in UNICODE were transformed to UTF-8, the scrambling frequency rates were increased 340% and 851% respectively.

A Formal Specification of Reusable Framework of Embedded System (임베디드 시스템의 재사용 프레임워크에 대한 정형명세)

  • Cho, Eun-Sook;Kim, Chul-Jin;Song, Chee-Yang
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.431-442
    • /
    • 2010
  • Because embedded system is combined system of hardware and software, we should design by considering elements such as real-time, reactive, small size, low weight, safe, reliable, harsh environment, low cost, and so on. However, those are poorly reflected on current embedded system development. Especially, there is few existed framework-based embedded system development. As a result, there are many internal codes which is not related with system operation in currently developed embedded system, and reusability or variability is not considered into embedded system development. Therefore we propose a formal specification technique using Z language to guarantee completeness or consistency of design of reusability framework proposed for improving reusability of embedded system. Also we assure correctness of framework design by checking Z model through Z-Eves Tool.

Souce Code Identification Using Deep Neural Network (심층신경망을 이용한 소스 코드 원작자 식별)

  • Rhim, Jisu;Abuhmed, Tamer
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.373-378
    • /
    • 2019
  • Since many programming sources are open online, problems with reckless plagiarism and copyrights are occurring. Among them, source codes produced by repeated authors may have unique fingerprints due to their programming characteristics. This paper identifies each author by learning from a Google Code Jam program source using deep neural network. In this case, the original creator's source is to be vectored using a pre-processing instrument such as predictive-based vector or frequency-based approach, TF-IDF, etc. and to identify the original program source by learning by using a deep neural network. In addition a language-independent learning system was constructed using a pre-processing machine and compared with other existing learning methods. Among them, models using TF-IDF and in-depth neural networks were found to perform better than those using other pre-processing or other learning methods.