• Title/Summary/Keyword: checking

Search Result 3,157, Processing Time 0.028 seconds

A Study on the Transformation of Two Dimensional Geodetic Coordinates between Bessel and WGS84 Ellipsoids by UTM Projection (UTM투영에 의한 Bessel과 WGS84 타원체간의 2차원 측지좌표변환 연구)

  • 이용창;강준묵
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.149-158
    • /
    • 1998
  • The aim of this paper is to propose the technique of the two dimensional geodetic coordinates conversion between WGS84 and Bessel spheroids by the two-dimensional affine transformation modeling based on the UTM plane coordinates without the local geoid model which is essential to three dimensional coordinates conversion. Area of approximately $25\times{11}$ square km in the city of Inchon was selected as the test area. The transformation parameters were determined using the eleven triangulation control points in test area. And then, those paraneters were applied to the fifteen cadastral control points which selected as checking points for precision checking of transformation parameters. The average and standard deviations of the absolute values of the conversion residuals of checking points in latitude/longitude and N/E(UTM) and/or x/y(TM) are $\pm0.006"$$\pm0.013"$ and $\pm{17cm/}\pm{30cm}$ respectively. Also, coefficients for 7-parameters, 3-parameters and UTM model transformation computed according as sizes of transformed area, and then the transformed characteristics of checking points according to transformation methods analyzed synthetically.hetically.

  • PDF

Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection (OLE 원격 접속 기능을 이용한 MS-SQL 패스워드 취약점 점검 기능 설계)

  • Jang, Seung Ju
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.97-104
    • /
    • 2015
  • This paper will feature designs for security vulnerability based on MS-SQL Database and OLE connectivity by checking the MS-SQL database password policy, the user account password access attempts, a user without password, and password does not be changed for a period of time. This paper uses the MS-SQL database and C++ linkage in order to use the OLE DB function. The design module should judge presence or absence of security vulnerability by checking database password policy, the user account password access attempts, a user without password, password does not be changed for a period of time. The MS-SQL database password associated with a feature, judging from the many features allows you to check for security vulnerability. This paper strengthen the security of the MS-SQL database by taking the advantage of the proposed ability.

NFC-based Attendance Checking System for Institutions of Higher Education (NFC 기반의 고등교육기관 출결지원 시스템에 대한 실증적 연구)

  • Cho, Yun Seok;Kim, KyungMi
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.283-289
    • /
    • 2015
  • We propose a low cost attendance checking system using NFC (Near Field Communication) and show a case study of an actual operation of the system in a higher education institute. The system offers a direct attendance check service when a student touches NFC tag on a classroom desk with his/her own smartphone. Our service was first developed and operated in 2012, and then additional functions like massive real time processing were reinforced. In the fall semester, 58 courses use the service and 96% of the class attendance was checked with mobile devices. The only hardware requirement of the system was NFC tag on the classroom desk, which reduced hardware cost dramatically. However, it also minimized attendance checking time into 1 minute regardless of enrolled student number.

The Study on Reading Education Method to Improve the Cognitive Ability for the Petty officer Majoring Students in Community College (전문대학 부사관과의 인지 능력 향상을 위한 읽기 교육방안 연구)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.123-131
    • /
    • 2018
  • The goal of this study is to look deeper into a reading education method for improving cognitive abilities of petty officer majoring students in community college level. Lack of the cognitive ability through the passing status of reading information processing highly can cause a problem for understanding information of context. Therefore, this study redefines the reading step to improve the cognitive ability. also, it sets up progress steps; material selection - learning - inspection - practice based on the cognitive abilities. To achieve those goals, there are two major ways. The first, setting up a proper reading assignment that is suitable for petty officer major students in community college level is a key step for this study. Second, the instructor leads the students to judge their own cognitive ability objectively by using a portfolio curriculum which contains a checking list of the portfolio, structuring a curriculum based on weekly achievements, self-checking, and setting up a direction of practice. The two presented ways are the most effective ways to develop students' cognitive ability based on continuous reading and checking. For the last, the study mentions a proposal for further tasks in this field of the study.

  • PDF

Maneuvering character of hull form renovated tuna purse seiner (선형개조 선망선의 조종성능)

  • Hong, Jin-Keun;Kang, Il-Kwon;Jeong, Seong-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.1
    • /
    • pp.61-70
    • /
    • 2015
  • In an attempt to improve the maneuvering character of hull form renovated tuna purse seiner. A renovation was carried out on the 3 tuna purse seiner fishing vessel. To grasp the progress of maneuvering and resistance on ship B (730 ton class), new bulbous bow was only attached. The ship A (740 ton class) and C (600 ton class) were modified for new bulbous bow, enlarged slipway and rudder. And then the zigzag and the turning test were carried out. According to the turning test, the advance and the tactical diameter were improved very much for the modified ship. The sea trial was carried out for the original and modified ship A. It is showed that the results of sea trial corresponded with that of the tank test on the whole. In the result of the zigzag test on ship B, the turning ability was improved very much, but the yaw checking ability was deteriorated in just some degree. In the result of the zigzag test on ship C, the turning ability and yaw checking ability were remarkably improved. Ship C was greatly improved among the three ships for the maneuvering character of modified hull form.

The design for controllabel self-checking checker (제어 가능한 자체검사 특성 검사기 설계)

  • 양성현;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1149-1159
    • /
    • 1998
  • This paper presents the Controllable Self-Checking(CSC) Checker at which can be used the Fault-Tolerant System with the redundancy. According to the critical level of output(of system), especially, it can be instructed the time if it has to check the output or not. We adop the deterministic test, performed on-line, to detect the faults with a minimal test set. The results show the Parity 2-rail checker(P-TRC) which is designed much simpler than the checker has the higher fault coverage than the existent checker.

  • PDF

Comparison of Nios II Core-based Accelerators (Niod II 코어기반 가속기 비교)

  • Song, Gi-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.639-645
    • /
    • 2015
  • Checksum and residue checking accelerators were implemented on a Nios II core-based platform according to component method, in which the corresponding hardware was implemented with HDL coding, a custom instruction method, in which the instruction set of the processor was extended, and the C2H method, in which the corresponding logic was automatically created by the C2H compiler. The processing results from each accelerator for each algorithm were then examined and compared. The results of the comparison showed that the accelerator implemented with the C2H method is the fastest in terms of the execution time, and the accelerator with custom instruction requires the least add-on from the viewpoint of add-on hardware.

Local Model Checking for Verification of Real-Time Systems (실시간 시스템 검증을 위한 지역모형 검사)

  • 박재호;김성길;황선호;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.77-90
    • /
    • 2000
  • Real-Time verification is a procedure that verifies the correctness of specification related to requirement in time as well as in logic. One serious problem encountered in the verification task is that the state space grows exponentially owing to the unboundedness of time, which is termed the state space explosion problem. In this paper, we propose a real-time verification technique checking the correctness of specification by showing that a system model described in timed automata is equivalent to the characteristic of system property specified in timed modal-mu calculus. For this, we propose a local model checking method based on the value of the formula in initial state with constructing product graph concerned to only the nodes needed for verification process. Since this method does not search for every state of system model, the state space is reduced drastically so that the proposed method can be applied effectively to real-time system verification.

  • PDF

Automatic Translations for Model Checking of LD Programs (LD 프로그램의 모델 체킹을 위한 자동변환)

  • Kwon, Min-Hyuk;Shin, Seung-Cheol
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.201-206
    • /
    • 2010
  • PLCs are special purpose microcontrollers used in most automatic control systems such as plants, embedded systems, and intelligent buildings. LD is one of the most popular languages among PLC languages. For now LD programs are mainly verified by simulation and testing which has a lot of limitation. This paper describes how to translate a given LD program into an input of a model checker so that LD program is verified by model checking. We define formal semantics of LD programs and SMV models and specify a formal definition of the translation function which preserves semantics between LD programs and SMV models.

A Study on purchasing, consumption and disposing skill of Adolescents and Related Variables (청소년의 구매기능, 사용기능, 처분기능과 관련 변수)

  • 박순덕;박명숙
    • Journal of Korean Home Economics Education Association
    • /
    • v.11 no.2
    • /
    • pp.65-76
    • /
    • 1999
  • The purposes of this study are (1) to research the purchasing consumption and disposing skill of adolescents and related variables and (2) to provide some informations about the consumer education program and policy for adolescents. The survey of this study was conducted using questionnaires. The data used in this study included 649 adolescents in Phohang. The statistics used for data analysis were frequency distribution, mean, standard deviation, analysis of variance(ANOVA) with Scheffe'-test. T-test, Multiple Regression Analysis, using the SPSS Win program. The results of this research were as follows:1) Purchasing skill was different significantly according to sex, grade, mother’s educational level, the degree of keeping an account book, the degree of checking after using the pocket money, interest on the contents related with consumer’s daily life and communication about consumption with their friends and parents. Consumption skill was different significantly according to grade, amount of pocket money, the degree of keeping an account book, the degree of checking after using the pocket money, interest on the contents related with consumer’s daily life and communication about consumption with their parents. Disposing skill was different significantly according to grade, from of school amount of pocket money, the degree of keeping an account book, the degree of checking after using the pocket money, interest on the contents related with consumer’s daily life and communication about consumption with their parents. 2) The most influential variable of purchasing, consumption & disposing skill was ‘communication about consumption with their parents’ and ‘the interest on the contents related with consumer’s daily life’respectively.

  • PDF