• Title/Summary/Keyword: 연산 지도

Search Result 4,007, Processing Time 0.037 seconds

A Hybrid Method for Improvement of Evolutionary Computation (진화 연산의 성능 개선을 위한 하이브리드 방법)

  • 정진기;오세영
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.159-165
    • /
    • 2002
  • 진화연산에는 교배, 돌연변이, 경쟁, 선택이 있다. 이러한 과정 중에서 선택은 새로운 개체를 생산하지는 않지만, 모든 해중에서 최적의 해가 될만한 해는 선택하고, 그러지 않은 해는 버리는 판단의 역할을 한다. 따라서 아무리 좋은 해를 만들었다고 해도, 취사 선택을 잘못하면, 최적의 해를 찾지 못하거나, 또 많은 시간이 소요되게 된다. 따라서 본 논문에서는 stochastic한 성질을 갖고 있는 Tournament selection에 Local selection개념을 도입하여, 지역 해에서 벗어나 전역 해를 찾는데, 개선이 될 수 있도록 하였고 Fast Evolutionary Programming의 mutation과정을 개선하고, Genetic Algorithm의 연산자인 crossover와 mutation을 도입하여 Parallel search로 지역 해에서 벗어나 전역 해를 찾는 하이브리드 알고리즘을 제안하고자 한다.

  • PDF

Active RC Synthesis Using Integrators (적분회로를 응용한 능동 RC 회로합성)

  • 이영근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.9 no.5
    • /
    • pp.6-11
    • /
    • 1972
  • A general active RC network synthesis procedure which realizes any stable transfer function is described. The network elements are only R's, C's and OA's, and the network configuration are well suited for construction using thin-film RC networks and integrated cil'suit operational amplifiers. Poles and transmission zeros can be adjusted independently to each other and are qu;te insensitive to element variations.

  • PDF

대수적인 관점에서의 수와 연산

  • Choe, Chang-U
    • Communications of Mathematical Education
    • /
    • v.11
    • /
    • pp.71-83
    • /
    • 2001
  • 80년대 후반부터 90년대 중반까지 NCTM을 비롯한 여러 수학교육 관련 기관 단체에서는 많은 규준(standards)들을 내 놓았다. 그 내용은 대체적으로 어떠한 수학을 어린이들이 학습해야할지, 교실 수업은 어떠한 모습으로 이루어져야하며, 어린이들이 수행하는 것과 수학프로그램들의 효율성을 판단하고 평가하기 위해 어떠한 지침이 사용될 수 있는지에 대한 권고 사항들로 이루어져 있다고 볼 수 있다. 본 고에서는 이러한 규준들의 내용 중 수 와 연산 영역에서 제시된 규준들을 토대로 우리의 7차 교육과정과 관련지어 알아보고 아울러 대수적인 관점에서 이 영역을 지도하는데 있어서 몇 가지 간과하기 쉬운 유의점(교사의 관점에서)들을 살펴보았다.

  • PDF

Fast Modular Exponentiation on a Systolic Array (시스톨릭 어레이상에서 고속 모듈러 지수 연산)

  • 이건직
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.1
    • /
    • pp.39-52
    • /
    • 1998
  • 본 논문에서는 모듈러 지수승시에 요구되는 모듈러 곱셈의 반복 횟수를 줄이기 위해 SM(m)기법을 제안하며 지수를 SM(m)표현과 시스톨릭 SM(m) 표현으로 변환한다.그리고 변환된 스스톨릭 SM(m) 표현으로부터 모듈러 지수연산을 위한 선형시스톨릭 어레이를 제시한다. 제안된 기법은 기존의 방법보다 소프트웨어로 구현시에 선 계산기에 필요한 기업 장소의 크기를 줄였으며, 선형 시스톨릭 어레이로 구현시에 기존의 방법들보다 처리기의 개수를 감소시키며, 처리기내에 필요한 기억 장소의 크기를 줄였다. 수정된 부호화 디지트 기법과 비교하면 처리기의 개수를 24%정도 줄일 수 있다.

Secret Sharing Scheme Using Visual Cryptography (시각암호에 의한 비밀 분산법)

  • 김미라
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.4
    • /
    • pp.37-50
    • /
    • 1997
  • 시각암호는 기존의 비밀 분산법이 비밀을 분산/복호시의 방대한 연산량을 수반하는 것과는 달리 인간의 시각에 의해 직접 복호되기 때문에 복잡한 연산이 필요없는 방식이다. 본 논문에서는 중첩하는 슬라이드의 매수에 따라 복수의 비밀화상이 복원되는 시각암호에 대해 알아보고, 그 안전성을 검증한다. 분산하고자 하는 비밀화상의 수가 증가함에 따라 크기가 기하 급수적으로 커지기 때문에 복원화성의 인식이 어렵게 된다. 따라서 고정 가중치 부호의 해밍 거리를 조정하여 줄임으로서 복원화상의 해상도를 개선하는 방법을 제안한다.

A Study on Caching Methods in Client-Server Systems for Mobile GIS (모바일 GIS를 위한 클라이언트-서버 시스템에서 캐슁기법 연구)

  • 김진덕;김미란;최진오
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.201-204
    • /
    • 2002
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selective deletion of objects and cache compaction at client. The conversion is time intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, for the efficient map control in the vector map service based mobile phone, it is necessary to study the method for reducing wireless network bandwidth and for overwhelming the limited resources of mobile phone as well. This paper proposes the methods for caching pre-received spatial objects in client-server systems for mobile GIS. We also analyze the strengths and drawbacks between the reuse of cached data and transmission of raw data respectively.

  • PDF

Comparative Analysis of Mathematics Textbooks in Elementary Schools between Korea and Canada - Focusing on the Numbers and Operations in 5th and 6th Grade - (한국과 캐나다 초등학교 수학 교과서 비교 분석 - 초등학교 5, 6학년 수와 연산 영역을 중심으로 -)

  • Kim, Aekyong;Ryu, Heuisu
    • Journal of Science Education
    • /
    • v.44 no.3
    • /
    • pp.331-344
    • /
    • 2020
  • This study aims to find meaningful implications for the development of Korean elementary school math education courses and textbooks by comparing and analyzing the number and arithmetic areas of Korean and Canadian math textbooks in fifth and sixth grades. To this end, the textbook composition system of Korean and Canadian elementary schools was compared and analyzed, and the number and timing of introduction of math textbooks and math textbooks by grade, and the number in fifth and sixth grade and the learning contents of math textbooks were compared and analyzed. The following conclusions were obtained from this study: First, it is necessary to organize a textbook that can solve the problem in an integrated way by introducing the learned mathematical concepts and computations naturally in the context of problems closely related to real life, regardless of the type of private calculation or mathematics area. Second, it is necessary to organize questions using materials such as real photography and mathematics, science, technology, engineering, art, etc. and to organize textbooks that make people feel the necessity and usefulness of mathematics. Third, sufficient learning of the principles of mathematics through the use of various actual teaching aids and mathematical models, and the construction of textbooks focusing on problem-solving strategies using engineering tools are needed. Fourth, in-depth discussions are needed on the timing of learning guidance for fractions and minority learning or how to organize and develop learning content.

Design and Implementation of a Spatial-Operation-Trigger for Supporting the Integrity of Meet-Spatial-Objects (상접한 공간 객체의 무결성 지원을 위한 공간 연산 트리거의 설계 및 구현)

  • Ahn, Jun-Soon;Cho, Sook-Kyoung;Chung, Bo-Hung;Lee, Jae-Dong;Bae, Hae-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.127-140
    • /
    • 2002
  • In a spatial database system, the semantic integrity should be supported for maintaining the data consistency. In the real world, spatial objects In boundary layer should always meet neighbor objects, and they cannot hold the same name. This characteristic is an implied concept in real world. So, when this characteristic is disobeyed due to the update operations of spatial objects, it is necessary to maintain the integrity of a layer. In this thesis, we propose a spatial-operation-trigger for supporting the integrity of spatial objects. The proposed method is defined a spatial-operation-trigger based on SQL-3 and executed when the constraint condition is violated. A spatial-operation-trigger have the strategy of execution. Firstly, for one layer, the spatial and aspatial data triggers are executed respectively. Secondly, the aspatial data trigger for the other layers is executed. Spatial-operation-trigger for one layer checks whether the executed operation updates only spatial data, aspatial data, or both of them, and determines the execution strategy of a spatial-operation-trigger. Finally, the aspatial data trigger for the other layers is executed. A spatial-operation-trigger is executed in three steps for the semantic integrity of the meet-property of spatial objects. And, it provides the semantic integrity of spatial objects and the convenience for users using automatic correcting operation.

Hardware Fault Attack Resistant RSA-CRT with Parallel Support (오류주입 공격에 강건하며 병렬연산이 가능한 RSA-CRT)

  • Eun, Ha-Soo;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.59-70
    • /
    • 2012
  • RSA-CRT is one of the commonly used techniques to speedup RSA operation. Since RSA-CRT performs its operations based on the modulus of two private primes, it is about four times faster than RSA. In RSA, the two primes are normally thrown away after generating the public key pair. However, in RSA-CRT, the two primes are directly used in RSA operations. This led to hardware fault attacks which can be used to factor the public modulus. The most common way to counter these attacks is based on error propagation. In these schemes, all the outputs of RSA are affected by the infected error which makes it difficult for an adversary to use the output to factor the public modulus. However, the error propagation has sequentialized the RSA operation. Moreover, these schemes have been found to be still vulnerable to hardware fault attacks. In this paper, we propose two new RSA-CRT schemes which are both resistant to hardware fault attack and support parallel execution: one uses common modulus and the other one perform operations in each prime modulus. Both proposed schemes takes about a time equal to two exponentiations to complete the RSA operation if parallel execution is fully used and can protect the two private primes from hardware fault attacks.