• Title/Summary/Keyword: Low complexity

Search Result 1,851, Processing Time 0.028 seconds

The Analysis of the Educational Objectives, Scientific Models and Cognitive Processes in Scientific Inquiry of the SNU Scientifically Gifted Student Program (서울대학교 과학 영재 프로그램의 학습 목표, 과학적 모형, 과학탐구의 인지 과정 분석)

  • Shin My-Young;Chun Miran;Choe Seung-Urn
    • Journal of the Korean earth science society
    • /
    • v.26 no.5
    • /
    • pp.387-394
    • /
    • 2005
  • We have analyzed the science-gifted educational program (year 2002) at the Seoul National University in terms of its educational objectives, scientific models, and cognitive processes in scientific inquiry in order to provide insights into developing and improving science-gifted educational program. We assumed the following items as important factors for teaching scientifically gifted students: higher-order thinking skills involving synthesis domain in the educational objectives, highly abstract nature and complexity in the scientific models, cognitive processes of planning experiments in the cognitive processes in scientific inquiry. According to the analyzed results, the program has the following characteristics: (1) the rates of both higher and lower-order thinking skill domain in the educational objectives are similarly high, but the rate of synthesis domain is relatively low; (2) in the case of the scientific models, the rate of the multiple concepts and/or processes model is relatively low, while the level of the abstractness is relatively on average (3) cognitive processes of authentic scientific inquiry is not thoroughly reflected in the scientific inquiry activities, and very few cognitive processes of planning experiments factor is reflected. Therefore, we conclude in the synthesis domain in the educational objectives, multiple concepts and/or processes model, and cognitive processes of planning experiments should be especially reflected more on the science-gifted educational program in order to serve the needs of scientifically gifted students.

PVC Classification based on QRS Pattern using QS Interval and R Wave Amplitude (QRS 패턴에 의한 QS 간격과 R파의 진폭을 이용한 조기심실수축 분류)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.825-832
    • /
    • 2014
  • Previous works for detecting arrhythmia have mostly used nonlinear method such as artificial neural network, fuzzy theory, support vector machine to increase classification accuracy. Most methods require accurate detection of P-QRS-T point, higher computational cost and larger processing time. Even if some methods have the advantage in low complexity, but they generally suffer form low sensitivity. Also, it is difficult to detect PVC accurately because of the various QRS pattern by person's individual difference. Therefore it is necessary to design an efficient algorithm that classifies PVC based on QRS pattern in realtime and decreases computational cost by extracting minimal feature. In this paper, we propose PVC classification based on QRS pattern using QS interval and R wave amplitude. For this purpose, we detected R wave, RR interval, QRS pattern from noise-free ECG signal through the preprocessing method. Also, we classified PVC in realtime through QS interval and R wave amplitude. The performance of R wave detection, PVC classification is evaluated by using 9 record of MIT-BIH arrhythmia database that included over 30 PVC. The achieved scores indicate the average of 99.02% in R wave detection and the rate of 93.72% in PVC classification.

A Performance Improvement Scheme for a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터 성능 개선)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.415-426
    • /
    • 2005
  • Wireless internet, which becomes a hot social issue, has limitations due to the following characteristics, as different from wired internet. It has low bandwidth, frequent disconnection, low computing power, and small screen in user terminal. Also, it has technical issues to Improve in terms of user mobility, network protocol, security, and etc. Wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. In this paper, wireless internet proxy server clusters are used for the wireless Internet because their caching, distillation, and clustering functions are helpful to overcome the above limitations and needs. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the All-in-one structure which can be scalable in a systematic way but it also has disadvantages; 1) data sharing among cache servers is not allowed and 2) its communication structure among modules is complex. In this paper, we proposed its improved scheme which has an efficient communication structure among modules and allows data to be shared among cache servers. We performed experiments using 16 PCs and experimental results show 54.86$\%$ and 4.70$\%$ performance improvement of the proposed system compared to TranSend and All-in-one system respectively Due to data sharing amount cache servers, the proposed scheme has an advantage of keeping a fixed size of the total cache memory regardless of cache server numbers. On the contrary, in All-in-one, the total cache memory size increases proportional to the number of cache servers since each cache server should keep all cache data, respectively.

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

Mineralization and Characterization of Boseung Kaolin in Gaya Area (가야 지역 보성 고령토의 광화작용 및 광물 특성)

  • Noh, Jin-Hwan
    • Journal of the Mineralogical Society of Korea
    • /
    • v.21 no.4
    • /
    • pp.397-413
    • /
    • 2008
  • In Gaya area, the Boseong kaolin deposits exhibit locally unusual occurrences such as downward enrichment of kaoin minerals, characteristic hydrothermal alterations (illite and stilbite), and phase relations among kaolin minerals in addition to the extensive weathering of anorthositic country rocks. This indicates that the kaolin deposits seem to be genetically formed as a mixed hydrothermal and residual model. The kaolin ores can be divided into five types on the basis of differences in occurrence, mineral composition and characters. These consist of two types of high-grade ores ranging above 80% in grade and low-grade ores as low as less than 80% including feldspar residuals or the peculiar impurity phase of illite-vermiculite-stilbite. Halloysite and kaolinite are mostly coexisted in the Boseong kaolin, and these kaolin minerals exhibit diverse appearances in crystallinity and morphology. Such a diversity in mineral phase and crystallinity seems to be originated from the complexity in genesis. In addition to these diverse characters of the kaolin, its applied-mineralogical characteristics such as chemical composition, thermal properties, whiteness, viscosity, and etc. made it disadvantageous in terms of ore quality.

Hardware optimized high quality image signal processor for single-chip CMOS Image Sensor (Single-chip CMOS Image Sensor를 위한 하드웨어 최적화된 고화질 Image Signal Processor 설계)

  • Lee, Won-Jae;Jung, Yun-Ho;Lee, Seong-Joo;Kim, Jae-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.5
    • /
    • pp.103-111
    • /
    • 2007
  • In this paper, we propose a VLSI architecture of hardware optimized high quality image signal processor for a Single-chip CMOS Image Sensor(CIS). The Single-chip CIS is usually used for mobile applications, so it has to be implemented as small as possible while maintaining the image quality. Several image processing algorithms are used in ISP to improve captured image quality. Among the several image processing blocks, demosaicing and image filter are the core blocks in ISP. These blocks need line memories, but the number of line memories is limited in a low cost Single-chip CIS. In our design, high quality edge-adaptive and cross channel correlation considered demosaicing algorithm is adopted. To minimize the number of required line memories for image filter, we share the line memories using the characteristics of demosaicing algorithm which consider the cross correlation. Based on the proposed method, we can achieve both high quality and low hardware complexity with a small number of line memories. The proposed method was implemented and verified successfully using verilog HDL and FPGA. It was synthesized to gate-level circuits using 0.25um CMOS standard cell library. The total logic gate count is 37K, and seven and half line memories are used.

Analysis on the Power Efficiency of Smartphone According to Parameters (스마트폰의 구성 변수에 따른 전력 효율성 분석)

  • Son, Dong-Oh;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2013
  • Smartphone enables diverse applications to be used in mobile environments. In spite of the high performance of smartphones, battery life has become one of the major constraints in mobility. Therefore, power efficiency of the smartphone is one of the most important factors in determining the efficiency of the smartphone. In this paper, in order to analyze the power efficiency of the smartphone, we have various experiments according to several configuration parameters such as processor, display and OS. We also use diverse applications. As a result, power consumption is dependent on the processor complexity and display size. However, power consumption shows the unpredictable pattern according to the OS. Smartphone using android OS consumes high power when internet and image processing applications are executed, but It consumes low power when music and camera applications are executed. In contrary, smartphone based on iOS consumes high power when game and internet applications are executed but it consumes low power when camera and processing applications are executed. In general, smartphone using iOS is more power efficient than smartphone based on android OS, because smartphone using iOS is optimized in the perspective of the hardware and OS.

Unified Design Methodology and Verification Platform for Giga-scale System on Chip (기가 스케일 SoC를 위한 통합 설계 방법론 및 검증 플랫폼)

  • Kim, Jeong-Hun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.106-114
    • /
    • 2010
  • We proposed an unified design methodology and verification platform for giga-scale System on Chip (SoC). According to the growth of VLSI integration, the existing RTL design methodology has a limitation of a production gap because a design complexity increases. A verification methodology need an evolution to overcome a verification gap. The proposed platform includes a high level synthesis, and we develop a power-aware verification platform for low power design and verification automation using it's results. We developed a verification automation and power-aware verification methodology based on control and data flow graph (CDFG) and an abstract level language and RTL. The verification platform includes self-checking and the coverage driven verification methodology. Especially, the number of the random vector decreases minimum 5.75 times with the constrained random vector algorithm which is developed for the power-aware verification. This platform can verify a low power design with a general logic simulator using a power and power cell modeling method. This unified design and verification platform allow automatically to verify, design and synthesis the giga-scale design from the system level to RTL level in the whole design flow.

The Influence of Aesthetic Elements on Affect Symbol Design - Focused on the Korean Symbol Design - (선호 심볼 디자인에 대한 심미적 영향 요소의 관계 연구 - 한국 심볼 디자인을 중심으로 -)

  • Kim, Eun-Ju;Hong, Jung-Pyo;Hong, Chan-Seok
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.121-128
    • /
    • 2006
  • The elements to enhance preference in symbol design are mainly related to consumers' response and aesthetic elements. Because certain aesthetic elements in design affect consumers' response and it is actually presented through (the different level of) preference. This study through surveying case studies examines whether a certain aesthetic element in symbol design gives rise to much preference. According to the result of study, high preference in symbolic design depends on high level of Rhythm, Balance, Harmony, Elaboration, Round, Gestalt, Organic, and Artificial/Natural among aesthetic elements. In comparison, it is founded that Simplicity/complexity, Objective/Abstract, depth, and symmetry should be designed at the moderate level, and proportion, repetition of elements be at the low level. Additionally(or Besides) this study makes out that symbol design cases with high preference have shapes from natural material or patterns of traditional culture, while cases with low preference have shapes from geometric figures. On the basis of these results, a guideline of symbol design could De offered(or suggested) to fit preference of consumers. But, this study is mostly concerned with only affect among emotional reactions of consumer in a scope of study, and is considered only in the aspect of form excluding color and texture.

  • PDF

Failure Analysis of Aircraft Software Test Cases from a Perspective of Requirements Traceability (요구사항 추적성 관점에서 항공기 탑재 소프트웨어 시험 사례 실패 분석)

  • Kim, Sung-Sub;Cho, Hee-Tae;Lee, Seonah
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.357-366
    • /
    • 2020
  • As the proportion and complexity of software embedded in aircraft increase, risk factors such as mission failure, function failure and performance failure due to software errors also increase. In the mission-critical software systems such as aircraft software, managing requirement traceability is essential to maintain the software systems with minimal period and cost. However, the development company is not accurately complying with the guideline for managing requirement traceability due to various reasons such as development cost and schedule. Therefore, it is not easy to systematically establish and maintain requirement traceability. In the paper, we analyze actual test cases of aviation software systems from the viewpoint of requirements traceability in order to learn if there are failure cases of test cases due to the absence of systematic traceability management activities. We also check the risks associated with the failure cases according to the type and severity of the cases. As a result of analyzing a total of 7 aircraft-mounted software, failure cases could be divided into three types: omission of requirements, lack of connection between requirements and test procedures, and omission of test procedures. There were a total of 18 failure cases, 6 for each type. The numbers of high, middle and low risks were 1, 13 and 4, respectively, where the number of middle risks is largest.