• Title/Summary/Keyword: real time systems

Search Result 6,582, Processing Time 0.037 seconds

An Analysis of Teaching Divisor and Multiple in Elementary School Mathematics Textbooks (초등학교 수학 교과서에 나타난 약수와 배수지도 방법 분석)

  • Choi Ji Young;Kang Wan
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.7 no.1
    • /
    • pp.45-64
    • /
    • 2003
  • This study analyzes divisor and multiple in elementary school mathematics textbooks published according to the first to the 7th curriculum, in a view point of the didactic transposition theory. In the first and second textbooks, the divisor and the multiple are taught in the chapter whose subject is on the calculations of the fractions. In the third and fourth textbooks, divisor and multiple became an independent chapter but instructed with the concept of set theory. In the fifth, the sixth, and the seventh textbooks, not only divisor multiple was educated as an independent chapter but also began to be instructed without any conjunction with set theory or a fractions. Especially, in the seventh textbook, the understanding through activities of students itself are strongly emphasized. The analysis on the each curriculum periods shows that the divisor and the multiple and the reduction of a fractions to the lowest terms and to a common denominator are treated at the same period. Learning activity elements are increase steadily as the textbooks and the mathematical systems are revised. The following conclusion can be deduced based on the textbook analysis and discussion for each curriculum periods. First, loaming instruction method also developed systematically with time. Second, teaching method of the divisor and multiple has been sophisticated during the 1st to 7th curriculum textbooks. And the variation of the teaching sequences of the divisor and multiple is identified. Third, we must present concrete models in real life and construct textbooks for students to abstract the concepts by themselves. Fourth, it is necessary to develop some didactics for students' contextualization and personalization of the greatest common divisor and least common multiple. Fifth, the 7th curriculum textbooks emphasize inquiries in real life which teaming activities by the student himself or herself.

  • PDF

A study on the development of a ship-handling simulation system based on actual maritime traffic conditions (선박조종 시뮬레이터를 이용한 연안 해역 디지털 트윈 구축에 연구)

  • Eunkyu Lee;Jae-Seok Han;Kwang-Hyun Ko;Eunbi Park;Kyunghun Park;Seong-Phil Ann
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.200-201
    • /
    • 2023
  • Digital twin technology is used in various fields as a method of creating a virtual world to minimize the cost of solving problems in the real world, and is also actively used in the maritime field, such as large-scale systems such as ships and offshore plants. In this paper, we tried to build a digital twin of coastal waters using a ship-handling simulator. The digital twin of the coastal waters developed in this way can be used to safely manage Korea's coastal waters, where maritime traffic is complicated, by providing a actual maritime traffic data. It can be usefully used to develop and advance technologies related to maritime autonomous surface ships and intelligent maritime traffic information services in coastal waters. In addition, it can be used as a 3D-based monitoring equipment for areas where physical monitoring is difficult but real-time maritime traffic monitoring is necessary, and can provide functions to safely manage maritime traffic situations such as aerial views of ports/control areas, bridge views/blind sector views of ships in operation.

  • PDF

Along and across-wind vibration control of shear wall-frame buildings with flexible base by using passive dynamic absorbers

  • Ivan F. Huergo;Hugo Hernandez-Barrios;Roberto Gomez-Martinez
    • Wind and Structures
    • /
    • v.38 no.1
    • /
    • pp.15-42
    • /
    • 2024
  • A flexible-base coupled-two-beam (CTB) discrete model with equivalent tuned mass dampers is used to assess the effect of soil-structure interaction (SSI) and different types of lateral resisting systems on the design of passive dynamic absorbers (PDAs) under the action of along-wind and across-wind loads due to vortex shedding. A total of five different PDAs are considered in this study: (1) tuned mass damper (TMD), (2) circular tuned sloshing damper (C-TSD), (3) rectangular tuned sloshing damper (R-TSD), (4) two-way liquid damper (TWLD) and (5) pendulum tuned mass damper (PTMD). By modifying the non-dimensional lateral stiffness ratio, the CTB model can consider lateral deformations varying from those of a flexural cantilever beam to those of a shear cantilever beam. The Monte Carlo simulation method was used to generate along-wind and across-wind loads correlated along the height of a real shear wall-frame building, which has similar fundamental periods of vibration and different modes of lateral deformation in the xz and yz planes, respectively. Ambient vibration tests were conducted on the building to identify its real lateral behavior and thus choose the most suitable parameters for the CTB model. Both alongwind and across-wind responses of the 144-meter-tall building were computed considering four soil types (hard rock, dense soil, stiff soil and soft soil) and a single PDA on its top, that is, 96 time-history analyses were carried out to assess the effect of SSI and lateral resisting system on the PDAs design. Based on the parametric analyses, the response significantly increases as the soil flexibility increases for both type of lateral wind loads, particularly for flexural-type deformations. The results show a great effectiveness of PDAs in controlling across-wind peak displacements and both along-wind and across-wind RMS accelerations, on the contrary, PDAs were ineffective in controlling along-wind peak displacements on all soil types and different kind of lateral deformation. Generally speaking, the maximum possible value of the PDA mass efficiency index increases as the soil flexibility increases, on the contrary, it decreases as the non-dimensional lateral stiffness ratio of the building increases; therefore, there is a significant increase of the vibration control effectiveness of PDAs for lateral flexural-type deformations on soft soils.

Analysis on the Positional Accuracy of the Non-orthogonal Two-pair kV Imaging Systems for Real-time Tumor Tracking Using XCAT (XCAT를 이용한 실시간 종양 위치 추적을 위한 비직교 스테레오 엑스선 영상시스템에서의 위치 추정 정확도 분석에 관한 연구)

  • Jeong, Hanseong;Kim, Youngju;Oh, Ohsung;Lee, Seho;Jeon, Hosang;Lee, Seung Wook
    • Progress in Medical Physics
    • /
    • v.26 no.3
    • /
    • pp.143-152
    • /
    • 2015
  • In this study, we aim to design the architecture of the kV imaging system for tumor tracking in the dual-head gantry system and analyze its accuracy by simulations. We established mathematical formulas and algorithms to track the tumor position with the two-pair kV imaging systems when they are in the non-orthogonal positions. The algorithms have been designed in the homogeneous coordinate framework and the position of the source and the detector coordinates are used to estimate the tumor position. 4D XCAT (4D extended cardiac-torso) software was used in the simulation to identify the influence of the angle between the two-pair kV imaging systems and the resolution of the detectors to the accuracy in the position estimation. A metal marker fiducial has been inserted in a numerical human phantom of XCAT and the kV projections were acquired at various angles and resolutions using CT projection software of the XCAT. As a result, a positional accuracy of less than about 1mm was achieved when the resolution of the detector is higher than 1.5 mm/pixel and the angle between the kV imaging systems is approximately between $90^{\circ}$ and $50^{\circ}$. When the resolution is lower than 1.5 mm/pixel, the positional errors were higher than 1mm and the error fluctuation by the angles was greater. The resolution of the detector was critical in the positional accuracy for the tumor tracking and determines the range for the acceptable angle range between the kV imaging systems. Also, we found that the positional accuracy analysis method using XCAT developed in this study is highly useful and will be a invaluable tool for further refined design of the kV imaging systems for tumor tracking systems.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Performance Evaluation of Advance Warning System for Transporting Hazardous Materials (위험물 운송을 위한 조기경보시스뎀 성능평가)

  • Oh Sei-Chang;Cho Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.15-29
    • /
    • 2005
  • Truck Shipment Safety Information, which is a part of the development of NERIS is divided into Optimal Route Guidance System and Emergency Response System. This research is for establishing an advance warning system, which aims for preventing damages(fire, explosion, gas-escape etc.) and detecting incidents that are able to happen during transporting hazardous materials in advance through monitoring the position of moving vehicles and the state of hazardous materials in real-time. This research is peformed to confirm the practical possibility of application of the advance warning system that monitors whether the hazardous materials transport vehicles move the allowed routes, finds the time and the location of incidents of the vehicles promptly and develops the emergency system that is able to respond to the incidents as well by using the technologies of CPS, CDMA and CIS with testing the ability of performance. As the results of the test, communication accuracies are 99$\%$ in freeway, 96$\%$ in arterial, 97$\%$ in hilly sections, 99$\%$ in normal sections, 96$\%$ in local sections, 99$\%$ in urban sections and 98$\%$ in tunnels. According to those results, the system has been recorded a high success rate of communication that enough to apply to the real site. However, the weak point appeared through the testing is that the system has a limitation of communication that is caused in the rural areas and certain areas where are fewer antennas that make communication possible between on-board unit and management server. Consequently, for the practical use of this system, it is essential to develop the exclusive en-board unit for the vehicles and find the method that supplements the receiving limitation of the GPS coordinates inside tunnels. Additionally, this system can be used to regulate illegal acts automatically such as illegal negligence of hazardous materials. And the system can be applied to the study about an application scheme as a guideline for transporting hazardous materials because there is no certain management system and act of toxic substances in Korea.

  • PDF

Power Conscious Disk Scheduling for Multimedia Data Retrieval (저전력 환경에서 멀티미디어 자료 재생을 위한 디스크 스케줄링 기법)

  • Choi, Jung-Wan;Won, Yoo-Jip;Jung, Won-Min
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.4
    • /
    • pp.242-255
    • /
    • 2006
  • In the recent years, Popularization of mobile devices such as Smart Phones, PDAs and MP3 Players causes rapid increasing necessity of Power management technology because it is most essential factor of mobile devices. On the other hand, despite low price, hard disk has large capacity and high speed. Even it can be made small enough today, too. So it appropriates mobile devices. but it consumes too much power to embed In mobile devices. Due to these motivations, in this paper we had suggested methods of minimizing Power consumption while playing multimedia data in the disk media for real-time and we evaluated what we had suggested. Strict limitation of power consumption of mobile devices has a big impact on designing both hardware and software. One difference between real-time multimedia streaming data and legacy text based data is requirement about continuity of data supply. This fact is why disk drive must persist in active state for the entire playback duration, from power management point of view; it nay be a great burden. A legacy power management function of mobile disk drive affects quality of multimedia playback negatively because of excessive I/O requests when the disk is in standby state. Therefore, in this paper, we analyze power consumption profile of disk drive in detail, and we develop the algorithm which can play multimedia data effectively using less power. This algorithm calculates number of data block to be read and time duration of active/standby state. From this, the algorithm suggested in this paper does optimal scheduling that is ensuring continual playback of data blocks stored in mobile disk drive. And we implement our algorithms in publicly available MPEG player software. This MPEG player software saves up to 60% of power consumption as compared with full-time active stated disk drive, and 38% of power consumption by comparison with disk drive controlled by native power management method.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Ontology-based Course Mentoring System (온톨로지 기반의 수강지도 시스템)

  • Oh, Kyeong-Jin;Yoon, Ui-Nyoung;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.149-162
    • /
    • 2014
  • Course guidance is a mentoring process which is performed before students register for coming classes. The course guidance plays a very important role to students in checking degree audits of students and mentoring classes which will be taken in coming semester. Also, it is intimately involved with a graduation assessment or a completion of ABEEK certification. Currently, course guidance is manually performed by some advisers at most of universities in Korea because they have no electronic systems for the course guidance. By the lack of the systems, the advisers should analyze each degree audit of students and curriculum information of their own departments. This process often causes the human error during the course guidance process due to the complexity of the process. The electronic system thus is essential to avoid the human error for the course guidance. If the relation data model-based system is applied to the mentoring process, then the problems in manual way can be solved. However, the relational data model-based systems have some limitations. Curriculums of a department and certification systems can be changed depending on a new policy of a university or surrounding environments. If the curriculums and the systems are changed, a scheme of the existing system should be changed in accordance with the variations. It is also not sufficient to provide semantic search due to the difficulty of extracting semantic relationships between subjects. In this paper, we model a course mentoring ontology based on the analysis of a curriculum of computer science department, a structure of degree audit, and ABEEK certification. Ontology-based course guidance system is also proposed to overcome the limitation of the existing methods and to provide the effectiveness of course mentoring process for both of advisors and students. In the proposed system, all data of the system consists of ontology instances. To create ontology instances, ontology population module is developed by using JENA framework which is for building semantic web and linked data applications. In the ontology population module, the mapping rules to connect parts of degree audit to certain parts of course mentoring ontology are designed. All ontology instances are generated based on degree audits of students who participate in course mentoring test. The generated instances are saved to JENA TDB as a triple repository after an inference process using JENA inference engine. A user interface for course guidance is implemented by using Java and JENA framework. Once a advisor or a student input student's information such as student name and student number at an information request form in user interface, the proposed system provides mentoring results based on a degree audit of current student and rules to check scores for each part of a curriculum such as special cultural subject, major subject, and MSC subject containing math and basic science. Recall and precision are used to evaluate the performance of the proposed system. The recall is used to check that the proposed system retrieves all relevant subjects. The precision is used to check whether the retrieved subjects are relevant to the mentoring results. An officer of computer science department attends the verification on the results derived from the proposed system. Experimental results using real data of the participating students show that the proposed course guidance system based on course mentoring ontology provides correct course mentoring results to students at all times. Advisors can also reduce their time cost to analyze a degree audit of corresponding student and to calculate each score for the each part. As a result, the proposed system based on ontology techniques solves the difficulty of mentoring methods in manual way and the proposed system derive correct mentoring results as human conduct.

An Assessment of the Utility of Respiratory Synchronized Systems in the PET/CT Examination (PET-CT 검사 시 호흡 동조 시스템들의 유용성 평가)

  • Seong, Yong-Jun;Yoon, Seok-Hwan;Hyun, Jun-Ho;Lee, Hong-jae;Kim, Jin-Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.21 no.1
    • /
    • pp.34-38
    • /
    • 2017
  • Purpose During PET/CT examinations, the movements of internal organs caused by respiration are captured in images during multiple breathing cycles, resulting in the increases in tumor size and effects on SUV. Respiratory synchronized systems were used to evaluate tumor sizes and SUV changes. Materials and Methods Biograph mCT 64 was used for the equipment, and RPM and Anzai systems were used for the respiratory synchronized systems. We used point source and micro-phantom for an experimentation. We were performed on 12 patients who had solid tumors discovered at the base of the lung or at the top of the liver from August through September 2016. The PET images of the exhalation-to-breathing state and the CT images of the post-exhalation suspension state were gained to evaluate changes in radioactivity concentration (KBq/mL), SUVmax, cylinder diameter (mm), and tumor diameter (cm) under the conventional Static, RPM, and Anzai methods. Results The result of measuring the radioactivity concentration of the point source was RPM 94% and Anzai 91% against Static, respectively. In the two cylinders of different radioactivity in the micro-phantom, the SUVmax increased to RPM 61% and 78%, and Anzai 58% and 77% against Static, whereas the cylinder diameters decreased by RPM -26% and -28%, and Anzai -28% and -26%, each respectively. Among the patients, the SUVmax increased from a minimum of RPM 8.2% to a maximum of 94.4% against Static, and from a minimum of Anzai 7.6% to a maximum of 68.3%, respectively. As for the tumor diameters, a minimum of RPM -7.6% to a maximum of -28.9% were achieved, while the Anzai fell by a minimum of -9.6% to a maximum of -27.7%, respectively. There was no significant difference discovered in the phantom study between the RPM and Anzai, yet there was a meaningful difference in the patients' tumors (P<0.05). Conclusion The respiratory synchronized systems of RPM and Anzai yielded no significant difference in the phantom study in which the respiration was executed at regular intervals. However, it was discovered that the patients had a meaningful difference for the irregular respiratory cycle and inter-system differences. Still, the respiratory synchronized systems would be useful for the accurate diagnosis and SUV measurement as the tumor decreased in size against the existing Static and the SUV increased.

  • PDF