• 제목/요약/키워드: computing environment

검색결과 3,264건 처리시간 0.036초

수학 교과에서 계산적 사고(Computational Thinking)교육 (A Feasibility Study on Integrating Computational Thinking into School Mathematics)

  • 장경윤
    • 대한수학교육학회지:학교수학
    • /
    • 제19권3호
    • /
    • pp.553-570
    • /
    • 2017
  • 본 연구는 21세기 필수 능력으로 거론되는 계산적 사고의 의미를 살펴보고, 수학교과에서 CT 교육의 가능성 여부와 그 선행 조건을 탐색할 목적으로 수행되었다. 선행연구를 통해 컴퓨터, 학교교육, 수학교육에서의 CT의 정의와 구성 요소를 조사하였으며 본 연구에서는 수학교과에서 CT를 수학적 문제해결 관련 사고로 보았다. CT-컴퓨팅(컴퓨터 활용)-수학교육 세 영역 사이의 관계 고찰에서 컴퓨팅환경에서 유용한 CT이나 수학교육에는 포함되지 않는 영역에 주목하였다. CT와 수학교육의 통합논의에서는 컴퓨터가 전통적 수학교육의 보조 수단으로 허용되는 우리나라 수학교육 현황을 고려할 때, '컴퓨팅 환경에서의 수학적 문제해결'에 주목할 필요가 있다고 보았다. 수학교육에서 CT 교육은 컴퓨팅 환경 조성을 전제로 수학교과에서 수학 관련 과제에 해결을 위한 코딩, 문제해결, STEAM 교육 맥락에서 수학과 CT의 통합을 제시하였으며 이를 위하여 CT 통합을 지원하는 수학교육과정 마련 등 제반 조건을 논의하였다.

유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌 (Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment)

  • 남승좌;박석
    • 정보보호학회논문지
    • /
    • 제15권2호
    • /
    • pp.37-52
    • /
    • 2005
  • 기존의 응용에 따라 보호 객체들에 대한 접근을 역할들로 분류하여 역할을 중심으로 접근제어를 수행하는 역할 기반의 접근제어에 사용자 및 환경 정보를 이용한 정보 접근제어 기법이 연구되고 있다 중요 정보와 자원에 대하여 상황 정보를 이용하여 사용자와 환경에 유연하면서 강력한 접근제어의 수행에 관하여 연구되고 있다. 본 논문에서는 상황에 대한 정의와 중요한 의미 정보에 대하여 사용자와 자원, 환경을 고려한 유연한 접근제어 방법을 제시하고, 이때 발생할 수 있는 접근에 대한 충돌을 찾아내고 해결 방안을 제안한다. 상황 정보의 분류와 정의를 이용하여 상창 정보를 접근제어에 적용하는 방법과 상황 정보를 접근제어에 이용하였을 경우 발생할 수 있는 충돌을 분류하여 해결 방안을 제시한다. 이 논문은 유비쿼터스 컴퓨팅 환경에서 상황 정의와 분류론 이용하여 적절한 사용자가 적절한 객체와 어플리케이션 서비스의 사용을 보장하는 보안 정책과 모델의 개발을 위한 기초 연구이다. 권한이 있는 사용자에 의한 객체 접근의 단순 접근제어가 아니라 사용자는 자신의 상황과 연관된 객체, 자원, 서비스에 접근할 수 있음을 보장한다.

Numerical Simulation on Disproportionate Collapse of the Tall Glulam Building under Fire Conditions

  • Zhao, Xuan;Zhang, Binsheng;Kilpatrick, Tony;Sanderson, Iain
    • 국제초고층학회논문집
    • /
    • 제10권4호
    • /
    • pp.311-321
    • /
    • 2021
  • Perception of the public to structural fires is very important because there are only a number of tall timber buildings constructed in the world. People are hesitating to accept tall timber buildings, so it is essential to ensure the first generation of tall timber buildings to a very high standard, especially fire safety. Right now, there are no specific design standards or regulations for fire design of tall timber buildings in Europe. Even though heavy timber members have better fire resistance than steel components, many conditions still need to be verified before considering the use of timber materials, e.g. fire spread, post-fire collapse, etc. This research numerically explores the structural behaviours of a tall Glulam building when one of its internal Glulam (Glued laminated timber) columns fails after sustaining a full 120-min standard fire and is removed from the established finite element building model created in SAP2000. The numerical results demonstrate that the failure and removal of the selected internal Glulam column may lead to the local failure of the adjacent CLT (Cross laminated timber) floor slabs, but will not lead to large disproportionate damage and collapse of the whole building. Here, the building is assumed to be located in Glasgow, Scotland, UK.

유비쿼터스 환경에서의 상황 인지 시스템 연구 활동 소개 도우미 - - (A Context-Aware System in Ubiquitous Environment)

  • 박지형;이승수;김성주;염기원;이석호
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2004년도 추계학술대회 논문집
    • /
    • pp.1048-1052
    • /
    • 2004
  • The ubiquitous environment is to support people in their everyday life in an inconspicuous and unobtrusive way. This requires that information of the person and her preferences, liking, and habits are available in the ubiquitous system. In this paper, we propose the context aware system that can provide the tailored information service for user in ubiquitous computing environment. The system architecture is composed of 4 domain models that can perform some pre-defined tasks independently. And we suggest the hybrid algorithm combined with fuzzy and Bayesian network to reason what information is suitable for user environment. Finally, we apply to agent based RGA(Research Guide Assistant).

  • PDF

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Semantic Interoperability Framework for IAAS Resources in Multi-Cloud Environment

  • Benhssayen, Karima;Ettalbi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.1-8
    • /
    • 2021
  • Cloud computing has proven its efficiency, especially after the increasing number of cloud services offered by a wide range of cloud providers, from different domains. Despite, these cloud services are mostly heterogeneous. Consequently, and due to the rising interest of cloud consumers to adhere to a multi-cloud environment instead of being locked-in to one cloud provider, the need for semantically interconnecting different cloud services from different cloud providers is a crucial and important task to ensure. In addition, considerable research efforts proposed interoperability solutions leading to different representation models of cloud services. In this work, we present our solution to overcome this limitation, precisely in the IAAS service model. This solution is a framework permitting the semantic interoperability of different IAAS resources in a multi-cloud environment, in order to assist cloud consumers to retrieve the cloud resource that meets specific requirements.

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

양자컴퓨팅 기술 연구개발 동향 (R&D Status of Quantum Computing Technology)

  • 백충헌;황용수;김태완;최병수
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.20-33
    • /
    • 2018
  • The calculation speed of quantum computing is expected to outperform that of existing supercomputers with regard to certain problems such as secure computing, optimization problems, searching, and quantum chemistry. Many companies such as Google and IBM have been trying to make 50 superconducting qubits, which is expected to demonstrate quantum supremacy and those quantum computers are more advantageous in computing power than classical computers. However, quantum computers are expected to be applicable to solving real-world problems with superior computing power. This will require large scale quantum computing with many more qubits than the current 50 qubits available. To realize this, first, quantum error correction codes are required to be capable of computing within a sufficient amount of time with tolerable accuracy. Next, a compiler is required for the qubits encoded by quantum error correction codes to perform quantum operations. A large-scale quantum computer is therefore predicted to be composed of three essential components: a programming environment, layout mapping of qubits, and quantum processors. These components analyze how many numbers of qubits are needed, how accurate the qubit operations are, and where they are placed and operated. In this paper, recent progress on large-scale quantum computing and the relation of their components will be introduced.

Strategy for Task Offloading of Multi-user and Multi-server Based on Cost Optimization in Mobile Edge Computing Environment

  • He, Yanfei;Tang, Zhenhua
    • Journal of Information Processing Systems
    • /
    • 제17권3호
    • /
    • pp.615-629
    • /
    • 2021
  • With the development of mobile edge computing, how to utilize the computing power of edge computing to effectively and efficiently offload data and to compute offloading is of great research value. This paper studies the computation offloading problem of multi-user and multi-server in mobile edge computing. Firstly, in order to minimize system energy consumption, the problem is modeled by considering the joint optimization of the offloading strategy and the wireless and computing resource allocation in a multi-user and multi-server scenario. Additionally, this paper explores the computation offloading scheme to optimize the overall cost. As the centralized optimization method is an NP problem, the game method is used to achieve effective computation offloading in a distributed manner. The decision problem of distributed computation offloading between the mobile equipment is modeled as a multi-user computation offloading game. There is a Nash equilibrium in this game, and it can be achieved by a limited number of iterations. Then, we propose a distributed computation offloading algorithm, which first calculates offloading weights, and then distributedly iterates by the time slot to update the computation offloading decision. Finally, the algorithm is verified by simulation experiments. Simulation results show that our proposed algorithm can achieve the balance by a limited number of iterations. At the same time, the algorithm outperforms several other advanced computation offloading algorithms in terms of the number of users and overall overheads for beneficial decision-making.

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing

  • Liu, Yanpei;Huang, Wei;Han, Li;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.3892-3912
    • /
    • 2021
  • The recent rapid growth of mobile network traffic places multi-access edge computing in an important position to reduce network load and improve network capacity and service quality. Contrasting with traditional mobile cloud computing, multi-access edge computing includes a base station cooperative cache layer and user cooperative cache layer. Selecting the most appropriate cache content according to actual needs and determining the most appropriate location to optimize the cache performance have emerged as serious issues in multi-access edge computing that must be solved urgently. For this reason, a cache placement algorithm based on comprehensive utility in big data multi-access edge computing (CPBCU) is proposed in this work. Firstly, the cache value generated by cache placement is calculated using the cache capacity, data popularity, and node replacement rate. Secondly, the cache placement problem is then modeled according to the cache value, data object acquisition, and replacement cost. The cache placement model is then transformed into a combinatorial optimization problem and the cache objects are placed on the appropriate data nodes using tabu search algorithm. Finally, to verify the feasibility and effectiveness of the algorithm, a multi-access edge computing experimental environment is built. Experimental results show that CPBCU provides a significant improvement in cache service rate, data response time, and replacement number compared with other cache placement algorithms.