• Title/Summary/Keyword: 스택 효과

Search Result 62, Processing Time 0.025 seconds

Pedagogical effectiveness of algorithm visualizations in teaching the data structures and algorithms in elementary schools (초등학교의 자료구조와 알고리즘 수업에서 알고리즘 시각화의 교육적 효과)

  • Chun, Seok-Ju
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.2
    • /
    • pp.255-263
    • /
    • 2012
  • Early algorithm education is very important in order to nurture excellent S/W developers in an information society. However a algorithm learning is a great challenge to elementary school students since understanding what a computer algorithm written in a static text format meant to do is difficult. It is expected that a student can easily visualize a algorithm through animations. In this study, we evaluate the pedagogical effectiveness of algorithm visualizations in teaching the fundamental data structures and algorithms in elementary schools. Thus we defined a new measure called 'Algorithm Visualization Factor(AVF)' and developed both text-oriented and animation-oriented PPTs of algorithm education elements, that is, Stack, Queue, Bubble Sort, Heap Sort, BDF, and DFS. We have conducted experiments and evaluations on diverse students groups. Extensive experiment results show that the average score of the student groups using animation-orirented PPT is greater(22%) than the one of the student groups using text-orirented PPT.

  • PDF

Inverse Hysteresis Modeling for Piezoelectric Stack Actuators with Inverse Generalized Prandtl-Ishlinskii Model (Inverse Generalized Prandtl-Ishlinskii Model를 이용한 압전 스택 액추에이터의 역 히스테리시스 모델링)

  • Ko, Young-Rae;Kim, Tae-Hyoung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.193-200
    • /
    • 2014
  • Piezoelectric actuators have been widely used in various applications because they have many advantages such as fast response time, repeatable nanometer motion, and high resolution. However Piezoelectric actuators have the strong hysteresis effect. The hysteresis effect can degrade the performance of the system using piezoelectric actuators. In past study, the parameters of the inverse hysteresis model are computed from the identified parameters using the Generalized Prandtl-Ishlinskii(GPI) model to cancel the hysteresis effect, however according to the identified parameters there exist the cases that can't form the inverse hysteresis loop. Thus in this paper the inverse hysteresis modeling mothod is proposed using the Inverse Generalized Prandtl-Ishlinskii(IGPI) model to handle that problem. The modeling results are verified by experimental results using various input signals.

A deisgn of VHDL compiler front-end for the VHDL-to-C mapping (VHDL-to-C 사상을 위한 VHDL 컴파일러 전반부의 설계)

  • 공진흥;고형일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2834-2851
    • /
    • 1997
  • In this paper, a design and implementation of VHDL compiler front-end, aims at supporting the full-set of VHDL '87 & '93 LRM and carring out the preprocessing of VHDL-to-C, is described. The VHDL compiler front-end includes 1)the symbol tree of analyzed data to represent the hierarchy, the scope and visibility, the overloading and homograph, the concurrent multiple stacks in VHDL, 2)the data structure and supportig routies to deal with the objects, the type and subtype, the attribute and operation in VHDL, 3)the analysis of the concurrent/sequential statements, the behavior/structural descriptions, of semantic token and the propagation of symbol & type to improve the registration and retrieval procedure of analyzed data. In the experiments with Validation Suite, the VHDL compiler front-end could support the full-set specification of VHDL LRM '87 & '93; and in the experiments to asses the performance of symantic token for the VHDL hierachy/visibility/concurrency/semantic checking, the improvement of about 20-30% could be achieved.

  • PDF

Clip Toaster : Pastejacking Attack Detection and Response Technique (클립 토스터 : 페이스트재킹 공격 탐지 및 대응 기술)

  • Lee, Eun-young;Kil, Ye-Seul;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.192-194
    • /
    • 2022
  • This paper analyzes the attack method of pastejacking and proposes a clip toaster that can effectively defend it. When programming, developers often copy and paste code from GitHub, Stack Overflow, or blogs. Pastejacking is an attack that injects malicious data into the clipboard when a user copies code posted on the web, resulting in security threats by executing malicious commands that the user does not intend or by inserting dangerous code snippets into the software. In this paper, we propose clip toaster to visualize and alertusers of threats to defend pastejacking that threatens the security of the developer's terminal and program code. Clip Toaster can visualize security threat notifications and effectively detect and respond to attacks without interfering with user actions.

  • PDF

A Study on the Gas-liquid Separation Effect of the Knockout Drum in the Flare System (플레어시스템에서 녹아웃드럼의 기·액 분리효과에 관한 연구)

  • Kwon, Hyun-Gil;Baek, Jong-Bae;Kim, Sang-Ryung
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • Among the flare systems that handle discharged substances from safety valves, the knockout drum was a key facility for safety, but the installation standards were not clear, so it was necessary to review the standards acceptable to the workplace and regulatory agencies. After investigating the domestic and foreign technical standards of knockout drums and the deficiencies of previous studies, research was first conducted on the degree of mass discharge, the installation location of the intermediate knockout drum, and the effect of changes in the composition of the discharged material. As a result of the study under the process simulation conditions, the gas-liquid separation of the knockout drum was completed in a small amount of less than 7,500kg/hr. However, when more than that was released, the gas-liquid separation effect was small even with the addition of an intermediate knockout drum. In addition, when the composition ratio of the material easily condensed was increased (molar fraction 10%), the gas-liquid separation effect of the knockout drum increased in the case of mass release. The gas-liquid separation effect was analyzed to be greater when the knockout drum was installed adjacent to the stack than the knockout drum was installed adjacent to the process equipment.

A New RFID Multi-Tag recognition Algorithm using Collision-Bit (RFID 충돌 비트를 이용한 다중 태그 인식 알고리즘)

  • Ji, Yoo-Kang;Cho, Mi-Nam;Hong, Sung-Soo;Park, Soo-Bong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.55-58
    • /
    • 2008
  • RFID(Radio frequency IDentification) leader is collision of data, when recognizing the multiple tag the inside area. This collision became the cause which delays the tag recognition time of the leader. The protocol which prevents the delay of tag recognition time of the leader the place where representative it uses QT(Query Tree) algorithms, it uses a collision bit position from this paper and are improved QT-MTC(Query Tree with Multi-Tag Cognition) algorithms which it proposes. This algorithm stored the bit position which bit possibility and the collision where the collision happens occurs in the stack and goes round a tree the number of time which, it reduced could be identified two tags simultaneously in order, it was planned. A result of performance analysis, It compared in QT protocols and the this algorithm against the tag bit which is continued a tush efficiency improvement effect was visible.

  • PDF

Implementation of a ZigBee-based High Performance Sensor Node for the Robot Environment Platform (로봇환경플랫폼을 위한 직비 기반의 고성능 센서노드 구현)

  • Kim, Kee-Min;Lee, Kyung-Jung;Kim, Jae-O;Moon, Chan-Woo;Ahn, Hyun-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.69-75
    • /
    • 2010
  • In this paper, a ZigBee-based wireless sensor network is configured for the robot to effectively communicate with the environment platform where sensor nodes are implemented using high performance microcontrollers. The localization and the navigation functions are also required to the robot which performs the given task using various types of sensor information. A new type of ZigBee stack is developed using the RUM(Router Under MAC) of the Atmel Corp. and it is applied to a 32-bit ARM core microcontroller for the high performance sensor data manipulation and transmission. It is verified by experiments that the wireless sensor network consisting of developed high performance sensor nodes can be effectively used for the robot environment platform.

Dynamic Reconfiguration of Qis Visualization Spreadsheet (동적 재구성이 가능한 Qis Visualization Spreadsheet)

  • Jee, Sung-Hyun;Kwon, Young-Hee;Youn, Kil-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.79-86
    • /
    • 2005
  • The Qis visualizational spreadsheet environment is shown to be extremely effective in supporting the organized visualization of multi-dimensional data sets. The Qis consists of the reconfigurative 2D arrangement of spreadsheet elements at run time and each spreadsheet element has a novel framestack. As the feature, it supports 3D data structure of each element on the Qis. It enables the visualization spreadsheet to effectively manage, rapidly organize, and compactly encapsulate multi-dimensional data sets for visualization. Using several experiments with scientific users, the Qis has been demonstrated to be a highly interactive visual browsing tool for the analysis of multidimensional data, displaying 2D and 3D graphics, and rendering in each frame of the spreadsheet.

Applying TIPC Protocol for Increasing Network Performance in Hadoop-based Distributed Computing Environment (Hadoop 기반 분산 컴퓨팅 환경에서 네트워크 I/O의 성능개선을 위한 TIPC의 적용과 분석)

  • Yoo, Dae-Hyun;Chung, Sang-Hwa;Kim, Tae-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.351-359
    • /
    • 2009
  • Recently with increase of data in the Internet, platform technologies that can process huge data effectively such as Google platform and Hadoop are regarded as worthy of notice. In this kind of platform, there exist network I/O overheads to send task outputs due to the MapReduce operation which is a programming model to support parallel computation in the large cluster system. In this paper, we suggest applying of TIPC (Transparent Inter-Process Communication) protocol for reducing network I/O overheads and increasing network performance in the distributed computing environments. TIPC has a lightweight protocol stack and it spends relatively less CPU time than TCP because of its simple connection establishment and logical addressing. In this paper, we analyze main features of the Hadoop-based distributed computing system, and we build an experimental model which can be used for experiments to compare the performance of various protocols. In the experimental result, TIPC has a higher bandwidth and lower CPU overheads than other protocols.

Detecting code reuse attack using RNN (RNN을 이용한 코드 재사용 공격 탐지 방법 연구)

  • Kim, Jin-sub;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.15-23
    • /
    • 2018
  • A code reuse attack is an attack technique that can execute arbitrary code without injecting code directly into the stack by combining executable code fragments existing in program memory and executing them continuously. ROP(Return-Oriented Programming) attack is typical type of code reuse attack and serveral defense techniques have been proposed to deal with this. However, since existing methods use Rule-based method to detect attacks based on specific rules, there is a limitation that ROP attacks that do not correspond to previously defined rules can not be detected. In this paper, we introduce a method to detect ROP attack by learning command pattern used in ROP attack code using RNN(Recurrent Neural Network). We also show that the proposed method effectively detects ROP attacks by measuring False Positive Ratio, False Negative Ratio, and Accuracy for normal code and ROP attack code discrimination.