• Title/Summary/Keyword: 윈도우 환경

Search Result 568, Processing Time 0.034 seconds

A Study on Integrated Processing System for Finite Element Structural Analysis (유한요소 구조해석을 위한 전후처리 통합운영 시스템에 관한 연구)

  • 서진국;송준엽;신영식
    • Computational Structural Engineering
    • /
    • v.8 no.1
    • /
    • pp.161-172
    • /
    • 1995
  • An Integrated processing system for finite element structural analysis has been studied. It is designed to control integratedly the preprocessing, the execution and the postprocessing of a finite element structural analysis program on Windows. It becomes a better graphic user interface(GUI) for the concurrent representation of various inputs and outputs through the dialog-type on multi-windows by the multi-tasking and the object linking and embedding(OLE). Data input can be done easily through menus, dialog boxes and automatic stepwise inputs on the multiple windows, and then output results can be seen with input data on the same screen. Efficiency and validity of the system were examined by solving several numerical examples.

  • PDF

The Component based U-Learning System using Item Response Theory (문항반응이론을 이용한 컴포넌트 기반의 U-러닝 시스템)

  • Jeong, Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.127-133
    • /
    • 2007
  • The u-learning environment has been developed through a number of iterations, and has now been formally evaluated, through analysis of student learning results and the use of quantitative and qualitative measures, Generally, for advance learning effect and analysis of student learning results, the most learning system be use to the item analysis method. But, nowadays, it has using the IRT(Item Response Theory) instead of the item analysis method, The IRT adopts explicit models for the probability of each possible response to a test. Therefore, I proposed the lightweight component based u-learning system using the IRT. Applied device of u-learning is PDA which is in Windows mobile 5.0 environments.

  • PDF

Design and Implementation of File Access Control Module Based on Multi-Operating System (멀티 운영체제 기반의 파일 접근 제어 모듈 설계 및 구현)

  • Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.123-131
    • /
    • 2007
  • Recently, various threat and security incident are occurred for unspecified individuals, and this problem increases as the rapid of information sharing through Internet. The using of Information Security System such as IDS, Firewall, VPN etc. makes this problem minimal. However, professional knowledge or skill is needed in that case, normal user can't operate the Information Security System. This paper designs and implements File Access Control Module(FACM) to use easily for normal user against malicious threats and attacks. The FACM can exclude from malicious threats and attacks based on operation system rather than detection of threats and attacks. The FACM is working not only Windows System but also Linux System, and the FACM has effect on access control, integrity and non-repudiation for a file with an access control over files on the each OS that are used by multi-user.

  • PDF

Mining of Frequent Structures over Streaming XML Data (스트리밍 XML 데이터의 빈발 구조 마이닝)

  • Hwang, Jeong-Hee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.23-30
    • /
    • 2008
  • The basic research of context aware in ubiquitous environment is an internet technique and XML. The XML data of continuous stream type are popular in network application through the internet. And also there are researches related to query processing for streaming XML data. As a basic research to efficiently query, we propose not only a labeled ordered tree model representing the XML but also a mining method to extract frequent structures from streaming XML data. That is, XML data to continuously be input are modeled by a stream tree which is called by XFP_tree and we exactly extract the frequent structures from the XFP_tree of current window to mine recent data. The proposed method can be applied to the basis of the query processing and index method for XML stream data.

Join processing using Hash Index based on Ring Queue Buffer in DSMS (DSMS 에서 환형 큐 버퍼 기반의 해시 색인을 이용한 조인 기법)

  • Sang-Ki Kim;Yan Li;Sung-Ha Baek;Dong-Wook Lee;Gyoung-Bae Kim;Hae-Young Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.389-392
    • /
    • 2008
  • 유비쿼터스 환경에서 센서 데이터는 빠르고 연속적인 데이터 스트림 형태로 전송된다. 이러한 개별적인 데이터 스트림 정보를 연관되어 처리하기 위해 조인 연산이 필요하다. LWO, SWF 와 같은 기존 기법들은 Nested Loop Join 을 이용해 데이터 스트림 환경에서 조인 알고리즘을 제시하였다. 하지만 Nested Loop Join 을 사용하기 때문에 슬라이딩 윈도우의 크기에 따라 처리 속도가 영향을 많이 받고 XJoin 은 디스크 I/O 추가 비용이 필요하다. 제안 기법은 환형 큐 버퍼 기반의 해시 색인을 이용한 조인 기법은 환형 큐를 이용하여 데이터의 삽입, 삭제를 관리하고 해시 색인을 이용해 조인 연산을 처리 하여 제안 기법은 기존의 기법 보다 조인 연산을 보다 효율적으로 처리 할 수 있다.

A Human Sensibility Meter for Indoor Environmental Control Using Multiple Sensors (다중 센서를 이용한 실내 환경 제어용 감성 측정기)

  • Lee, Duk-Dong;Park, Kil-Heum;Choi, Doo-Hyun;Han, Dae-Hyun;Baek, Woon-Yi;Lim, Jeong-Ok;Hwang, Tae-Jin
    • Journal of Sensor Science and Technology
    • /
    • v.7 no.5
    • /
    • pp.327-333
    • /
    • 1998
  • A new human sensibility (kansei) meter that can measure human sensibility at the indoor environment is developed in this paper. Four sensors that can measure temperature, humidity, $CO_2$ and $C_4H_{10}$ concentrations are used. Among these sensors, the first three are used to determine the human sensibility. And the last to protect human from the harmful gas. First of all, human sensibilities are defined for each sensor datum, and then those are linearly combined to make a final human sensibility (kansei). The efficiency and usefulness of the meter are verified using a simulator on Windows 95 and a stand-alone system constructed using a microprocessor.

  • PDF

A Method for Frequent Itemsets Mining from Data Stream (데이터 스트림 환경에서 효율적인 빈발 항목 집합 탐사 기법)

  • Seo, Bok-Il;Kim, Jae-In;Hwang, Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.19D no.2
    • /
    • pp.139-146
    • /
    • 2012
  • Data Mining is widely used to discover knowledge in many fields. Although there are many methods to discover association rule, most of them are based on frequency-based approaches. Therefore it is not appropriate for stream environment. Because the stream environment has a property that event data are generated continuously. it is expensive to store all data. In this paper, we propose a new method to discover association rules based on stream environment. Our new method is using a variable window for extracting data items. Variable windows have variable size according to the gap of same target event. Our method extracts data using COBJ(Count object) calculation method. FPMDSTN(Frequent pattern Mining over Data Stream using Terminal Node) discovers association rules from the extracted data items. Through experiment, our method is more efficient to apply stream environment than conventional methods.

Subject poosition Systems Design of picture reflex (사진영상의 피사체 위치확인 시스템 설계)

  • Jo, Dong-Kwan;Chung, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.551-554
    • /
    • 2008
  • Do subject addition of existent picture reflex inside in this treatise as system that confirmation is available, do subject addition of picture reflex inside through GPS's photography position and Come on! direction angle of deviation campus to do confirmation possibility system design. Constructed each environment of Windows Operating System and embedded system environment for verification of system that is subject position of designed picture reflex also. To development environment of embedded system S3C2440A & used PXA270 processor, Camera and GPS in development baud, Come on! include deviation campus, and development language embodied in C language, and debugging environment did debugging using GCC compiler of Linux environment. PC software for verification designed system to confirm for subject position confirmation of picture reflex through Almap, Google Eartch developed verification software using visual C++. Also, groped way to utilize picture file by various field including position information within picture. Confirmed that decreased by error extent 1m within of radius 10m that is existent GPS's error extent as verification result.

  • PDF

Preliminary Study on Traffic Information Broadcasting Using a Gadget Framework (가젯을 이용한 교통정보 제공기법 기초연구)

  • Lim, Kwan-Su;Nam, Doo-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.2
    • /
    • pp.26-33
    • /
    • 2007
  • Social cost has been increased by traffic accident and congestion since early 1990s. The construction of roadways and railways has been suggested as countermeasures. However, ITS has finally introduced as a logical solution because the expenses of infrastructures are costly. The data collection field has developed through numerous researches and pilot projects. However the information provision field does need a lot of study. The traffic information broadcasting whether simple traffic information or the value-added information has been available via radio, television and internet which does not require tremendous investment compared with data collection stage. Therefore, this study reviews the suitability of the gadget service usually offered by window vista users which is the result of the development of technology and the changes of internet environment. It also suggests to using the RSS(Really Simple Syndication) manner as a basic method to provide the traffic information based on the needs of user in order to enhance the usability of traffic information. For this, this study analyzes the current methods and techniques of traffic information service which is widely available by local governments and companies and suggest possible changes and methods in order to provide Gadget-based service to the public.

  • PDF

Random Forest Method and Simulation-based Effect Analysis for Real-time Target Re-designation in Missile Flight (유도탄의 실시간 표적 재지정을 위한 랜덤 포레스트 기법과 시뮬레이션 기반 효과 분석)

  • Lee, Han-Kang;Jang, Jae-Yeon;Ahn, Jae-Min;Kim, Chang-Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.35-48
    • /
    • 2018
  • The study of air defense against North Korean tactical ballistic missiles (TBM) should consider the rapidly changing battlefield environment. The study for target re-designation for intercept missiles enables effective operation of friendly defensive assets as well as responses to dynamic battlefield. The researches that have been conducted so far do not represent real-time dynamic battlefield situation because the hit probability for the TBM, which plays an important role in the decision making process, is fixed. Therefore, this study proposes a target re-designation algorithm that makes decision based on hit probability which considers real-time field environment. The proposed method contains a trajectory prediction model that predicts the expected trajectory of the TBM from the current position and velocity information by using random forest and moving window. The predicted hit probability can be calculated through the trajectory prediction model and the simulator of the intercept missile, and the calculated hit probability becomes the decision criterion of the target re-designation algorithm for the missile. In the experiment, the validity of the methodology used in the TBM trajectory prediction model was verified and the superiority of using the hit probability through the proposed model in the target re-designation decision making process was validated.