• Title/Summary/Keyword: Software Solution

Search Result 1,058, Processing Time 0.031 seconds

The Understanding the Necessity Proof and Using Dynamic Geometry Software (증명의 필요성 이해와 탐구형 기하 소프트웨어 활용)

  • 류희찬;조완영
    • Journal of Educational Research in Mathematics
    • /
    • v.9 no.2
    • /
    • pp.419-438
    • /
    • 1999
  • This paper explored the impact of dynamic geometry software such as CabriII, GSP on student's understanding deductive justification, on the assumption that proof in school mathematics should be used in the broader, psychological sense of justification rather than in the narrow sense of deductive, formal proof. The following results have been drawn: Dynamic geometry provided positive impact on interacting between empirical justification and deductive justification, especially on understanding the necessity of deductive justification. And teacher in the computer environment played crucial role in reducing on difficulties in connecting empirical justification to deductive justification. At the beginning of the research, however, it was not the case. However, once students got intocul-de-sac in empirical justification and understood the need of deductive justification, they tried to justify deductively. Compared with current paper-and-pencil environment that many students fail to learn the basic knowledge on proof, dynamic geometry software will give more positive ffect for learning. Dynamic geometry software may promote interaction between empirical justification and edeductive justification and give a feedback to students about results of their own actions. At present, there is some very helpful computer software. However the presence of good dynamic geometry software can not be the solution in itself. Since learning on proof is a function of various factors such as curriculum organization, evaluation method, the role of teacher and student. Most of all, the meaning of proof need to be reconceptualized in the future research.

  • PDF

Evaluation Items of ESM S/W by Case Analysis (사례분석을 통한 ESM S/W의 평가항목)

  • Kang, Deuk-Soo;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.84-94
    • /
    • 2010
  • ESM can do and wishes to investigate ESM software field base technology and investigate ESM software technology, market, standard and evaluation certification trend and develop evaluation model of ESM software that it becomes foundation to protect ESM software effectively that develop quality evaluation model of ESM software in this research by integration security administration system that gather fire wall, IDS, VPN etc. various kind of security solution by one. That is, because reflecting requirement of ESM software, develop evaluation module and proposed evaluation example along with method of exam.

SYSTEM ANALYSIS OF PIPELINE SOFTWARE - A CASE STUDY OF THE IMAGING SURVEY AT ESO

  • Kim, Young-Soo
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.4
    • /
    • pp.403-416
    • /
    • 2003
  • There are common features, in both imaging surveys and image processing, between astronomical observations and remote sensing. Handling large amounts of data, in an easy and fast way, has become a common issue. Implementing pipeline software can be a solution to the problem, one which allows the processing of various kinds of data automatically. As a case study, the development of pipeline software for the EIS (European Southern Observatory Imaging Survey) is introduced. The EIS team has been conducting a sky survey to provide candidate targets to the 250 VLTs (Very Large Telescopes) observations. The survey data have been processed in a sequence of five major data corrections and reductions, i.e. preprocessing, flat fielding, photometric and astrometric corrections, source extraction, and coaddition. The processed data are eventually distributed to the users. In order to provide automatic processing of the vast volume of observed data, pipeline software has been developed. Because of the complexity of objects and different characteristic of each process, it was necessary to analyze the whole works of the EIS survey program. The overall tasks of the EIS are identified, and the scheme of the EIS pipeline software is defined. The system structure and the processes are presented, and in-depth flow charts are analyzed. During the analyses, it was revealed that handling the data flow and managing the database are important for the data processing. These analyses may also be applied to many other fields which require image processing.

NuDE 2.0: A Formal Method-based Software Development, Verification and Safety Analysis Environment for Digital I&Cs in NPPs

  • Kim, Eui-Sub;Lee, Dong-Ah;Jung, Sejin;Yoo, Junbeom;Choi, Jong-Gyun;Lee, Jang-Soo
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.1
    • /
    • pp.9-23
    • /
    • 2017
  • NuDE 2.0 (Nuclear Development Environment 2.0) is a formal-method-based software development, verification and safety analysis environment for safety-critical digital I&Cs implemented with programmable logic controller (PLC) and field-programmable gate array (FPGA). It simultaneously develops PLC/FPGA software implementations from one requirement/design specification and also helps most of the development, verification, and safety analysis to be performed mechanically and in sequence. The NuDE 2.0 now consists of 25 CASE tools and also includes an in-depth solution for indirect commercial off-the-shelf (COTS) software dedication of new FPGA-based digital I&Cs. We expect that the NuDE 2.0 will be widely used as a means of diversifying software design/implementation and model-based software development methodology.

Gigabit Ethernet Based Substation

  • Yang, Hyo-Sik;Raza, Ali;Park, Min-Woo;Kim, Sang-Sig;Jang, Hyuk-Soo;Lee, Myung-Ho;Kwon, Dong-Seop;Jang, Byung-Tae
    • Journal of Power Electronics
    • /
    • v.9 no.1
    • /
    • pp.100-108
    • /
    • 2009
  • Designing communication architecture for substation automation is a challenging and subtle task for visualizing substations in the digital world under the umbrella of IEC61850. Communication paradigms for substation automation are of critical importance because of two reasons; the communication arena is changing daily and opts for convenience and simple deployment at a lower migration cost and interoperability is one of the core constrains of IEC61850 for substation automation. This paper presents an analysis and outline of the crucial need for the deployment of Gigabit Ethernet in substations and also presents suggestions on how Ethernet technology can help in substation automation. Ethernet is one of the most pervasive communication technologies available and can provide a long term solution in the changing arena of communication. We have performed simulations in NS-2 to prove that our suggested communication paradigm is optimal in various regards with consideration of the constraints imposed by IEC61850.

A Code Scheduling Algorithm for Pipelined Architecture (파이프라인 아키텍쳐를 위한 코드 스케쥴링 알고리듬)

  • 김은성;임인칠
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.7
    • /
    • pp.746-758
    • /
    • 1988
  • This paper proposes a code scheduling algorithm which gives a software solution to the pipeline interlock. This algorithm provides a heuristic solution by recordering the instructions, instead of using hardware interlock mechanism when pipeline interlock prevents the execution of a machine instruction in a pipelined architecture. Program code size and overall execution time can be reduced due to the increased flexibility in the selection of instructions, which is possible from the alleviated ordering restriction on the use of conflict resources.

  • PDF

A Development Cost Estimation at Initial Phase for Military Software Using Backfiring Approach (백파이어링을 이용한 군사용 소프트웨어 초기단계 개발비용 산정 기법)

  • Lee Byong-Eun;Kang Sung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.737-744
    • /
    • 2005
  • As the portion of software cost in construction of the system related to the national defence is getting higher, the required accuracy of cost estimation on defense software in development is also getting higher. The PRICE S is used to estimate the software cost at the first stage in the development of software promptly. However, the PRICE S is appropriate for the American environment not for the Korean circumstances. Thus, we will present a method to compensate the PRICE S with comparing with the model of Korea Software Industry Association. Moreover, we also present another method to estimate software cost based on function point with backfiring approach, which will be used for the software projects planned. Finally, we expect that our works will provide a solution for applying the function point in the future and will increase the accuracy of cost estimation in software development.

STRUCTURAL INCONSISTENCY OF INTERNAL REPRESENTATIONS OF COGNITIVE PROCESSES OF SOFTWARE REUSE (소프트웨어 재사용시의 인지과정상에 나타난 내적표상의 구조적 불일관성)

  • JinwooKim
    • Korean Journal of Cognitive Science
    • /
    • v.4 no.2
    • /
    • pp.201-262
    • /
    • 1994
  • This paper portrays software reuse as analogical mapping and rule development.In order to explore the impacts of inconsistent representationS on the cognitive process of software resuse,it manipulates the intermal representations of source and target problems and their program solutions.The experimental design for this study has two factors:1)the degree of structural consistency between the source problem and the target problem,and2) the degree of structural consistency between the source problem and the source solution.A full-scale protocol analysis reveals that these two factors influence the cognitive process of mapping between source and target,the process of developing rules,and the interrelation between analogical mapping and rule development.The paper concludes by discussing the implications of these results for software reuse.

New Trend Proposal in Optimization Techniques Application for Mobile Network, Analysis and Signal Processing

  • HAMROUNI, Chafaa
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.221-230
    • /
    • 2020
  • Used optimization techniques as solution for mobile network have been implemented as a reference systems for various applications against fading and signals perturbation, in addition each transition to 5th generation telecommunication standards require a deep studies in order to park an applied instantaneous process. The paper describes a preliminary planning and a careful preparation to update both subscriber radio access network as well as data transmission network this approach conducts to make network resource updates invisible for customers and with minimal costs for mobile operators basically in terms of delay. In addition, network operators transit to mobile networks, multimedia services efficient delivery are considered the challenging application and the most promising for mobile network operators today, this work conduct to optimize video consumption of mobile users which are exponentially increasing. The interference is a complex phenomenon in mobile radio telecommunication system, and a mobile phone can be a source of interference to another one. Actual advances in technology necessitate the need for the complicated software solution that can take several unexpected phenomena in consideration to rise to a level higher than ever. The capability needs today require the use of Drive test which is used to take the performance of network in the field by using a special software called TEMS investigation, it have been implemented as standalone systems for various applications. The paper focuses on considering as the best technical for optimization of mobile networks, analysis and processing of signal, a Drive Test is the method used to take the performance of network in the field by using a special software called TEMS investigation. Most used in the world, this software is reputed to detect and analyze many problems of mobile network between the mobile phone and the transmitter: BTS in case of GSM and Node B for UMTS. An example of that is interference in radio communication. It exists permanently and it degrades considerably the quality of received signal when it exceeds certain levels.

Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing

  • Chae, Seung-Hoon;Lim, Sung-Jin;Bae, Sang-Hyun;Chung, Yong-Wha;Pan, Sung-Bum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1294-1310
    • /
    • 2010
  • User authentication using fingerprint information provides convenience as well as strong security. However, serious problems may occur if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers. Recently, research in fuzzy fingerprint vault system has been carried out actively to safely protect fingerprint information in a fingerprint authentication system. In addition, research to solve the fingerprint alignment problem by applying a geometric hashing technique has also been carried out. In this paper, we propose the hardware architecture for a geometric hashing based fuzzy fingerprint vault system that consists of the software module and hardware module. The hardware module performs the matching for the transformed minutiae in the enrollment hash table and verification hash table. On the other hand, the software module is responsible for hardware feature extraction. We also propose the hardware architecture which parallel processing technique is applied for high speed processing. Based on the experimental results, we confirmed that execution time for the proposed hardware architecture was 0.24 second when number of real minutiae was 36 and number of chaff minutiae was 200, whereas that of the software solution was 1.13 second. For the same condition, execution time of the hardware architecture which parallel processing technique was applied was 0.01 second. Note that the proposed hardware architecture can achieve a speed-up of close to 100 times compared to a software based solution.