• Title/Summary/Keyword: Number of Methods

Search Result 15,816, Processing Time 0.045 seconds

Realization of acoustic scattering holography (산란 음향 홀로그래피의 구현 방법론)

  • 이상협;김양한
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.640-644
    • /
    • 2003
  • There are many difficulties to get the scattered field generated by obstacle which has arbitrary shape or irregular surface impedance by using analytic solution or numerical methods. In this study, we propose experimental method of acoustic scattering holography that can predict the far-field scattered field based on nearfield measurements. In particular we can get the scattered fields of each wave-number components of incident fields. We express the relationship of wave-number components between incident fields and scattered fields using scattering matrix which is transfer matrix of wave-number components. Lastly, we prove the relation between wave-number components of incident and scattered field by experiments. The errors which are caused by measurements and decomposition methods are also analyzed.

  • PDF

An Analysis on the Contents of Textbooks about Converting between a Mixed number and an Improper fraction (대분수와 가분수의 상호 변환에 관한 교과서 내용 분석)

  • Lee, Dae Hyun
    • Education of Primary School Mathematics
    • /
    • v.19 no.4
    • /
    • pp.277-289
    • /
    • 2016
  • Fraction is one of the concepts which are difficult to elementary school students. So, many researches about fraction were performed in mathematics education research. In special, fraction has so many subordinative concepts-proper fraction, improper fraction, mixed number. We have to concentrate on the conceptual understanding in teaching of fraction. In this case, a mixed number and improper fraction are concepts which can convert respectively. And there are methods that a mixed number and improper fraction can be converted. So, it's needed to analyze the converting methods in textbooks for getting the implication of teaching in this areas. In this study, I analyzed the Korean and foreign's textbooks. I certified the methods-using addition expression, using part-whole model in the textbooks. For the conceptual understanding, I suggested to use the fusion of the various part-whole fraction models and addition expression more than the algorithm in converting between a mixed number and improper fraction. It's reason that the use of models in converting between a mixed number and improper fraction is important for the relational understanding.

A Study on Methods of Quality Check for Digital Basemaps using Statistical Methods for the Quality Control (통계적 품질관리기법을 도입한 수치지도의 검수방법에 관한 연구)

  • 김병국;서현덕
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.1
    • /
    • pp.79-86
    • /
    • 1999
  • In this study, we investigated methods of quality check for digital basemaps and proposed effective methods of quality check. We used new statistical methods for quality control in order to carry out quality check for digital basemaps. We proposed 2-stage complete sampling and 2-stage cluster sampling method to improve present statistical methods of quality check(1-stage complete sampling method). We estimated error rate and number of omitted objects using simulated data about all delivered digital basemaps and estimated variances about it. We could determine confidence interval about error rate and number of omitted objects.

  • PDF

Estimating Information Security Risk-Using Fuzzy Number Compromising Quantitative and Qualitative Methods (정보 자산 보안 위험 추정-정량적, 정성적 방법을 절충한 퍼지 숫자의 활용)

  • Pak, Ro-Jin;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.175-184
    • /
    • 2009
  • There have been two methods of estimating computer related security risk such as qualitative and quantitative methods which have distinctive advantages or disadvantages. The former is too narrative and somehow abstract to implement and the latter produces concrete result but needs lots of data, so that it is needed to develop a method overcoming such difficulties. It is advised to mix such two methods in a proper way depending on the conditions of a computer system. In this article, a concept of fuzzy number is employed on the way of mixing the two methods and provide a simple example using fuzzy numbers. Simulation was conducted for an assumed model system and it is demonstrated how to calculated expected and unexpected risk.

Finding an initial solution and modifying search direction by the centering force in the primal-dual interior point method (원쌍대 내부점기법에서 초기해 선정과 중심화 힘을 이용한 개선 방향의 수정)

  • 성명기;박순달
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.530-533
    • /
    • 1996
  • This paper deals with finding an initial solution and modifying search direction by the centrering force in the predictor-corrector method which is a variant of the primal-dual barrier method. These methods were tested with NETLIB problems. Initial solutions which are located close to the center of the feasible set lower the number of iterations, as they enlarge the step length. Three heuristic methods to find such initial solution are suggested. The new methods reduce the average number of iterations by 52% to at most, compared with the old method assigning 1 to initial valurs. Solutions can move closer to the central path fast by enlarging the centering force in early steps. It enlarge the step length, so reduces the number of iterations. The more effective this method is the closer the initial solution is to the boundary of the feasible set.

  • PDF

Analysis of Code Design Evaluation Methods According to Input/Output Information Conditions (입출력 정보 조건에 따른 코드 설계 평가 방법 분석)

  • Kyeong Hur
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.259-265
    • /
    • 2024
  • In order to improve the SW convergence capabilities of university undergraduate students, methods to evaluate undergraduate students' code design capabilities should be researched along with the development of related courses. In previous studies, there were qualitative evaluation methods and quantitative relative evaluation methods for code results. In the quantitative relative evaluation method, the number of problem decomposition depth, number of function reuses, and number of functions were measured and evaluated. In this study, an evaluation method that was not presented in previous studies was proposed using the problem of presenting the number of input and output information types when designing code. The evaluation problems proposed in this paper applied up to three types of input information and three types of output information. Through this, five code design evaluation questions were presented and a method to quantitatively calculate code design scores was proposed. Codes from 100 student respondents were collected and analyzed through courses that applied the proposed evaluation method. Through result analysis, the number of problem decomposition depths was proportional to the number of types of input information, the number of function reuses was proportional to the number of types of output information, and the number of functions showed a correlation that was proportional to the total number of types of input and output information. Lastly, by analyzing the distribution of evaluation scores of 100 respondents, we demonstrated that the code design evaluation method according to the five input/output information condition evaluation problems is effective.

The consideration for methods of statistical analysis about the thesis published in the journal of korean oriental medical Ophthalmology & Otolaryngology & Dermatology from 2003 to 2005 (2003년부터 2005년까지 안이비인후피부과 학회지에 게재된 논문들의 통계적 분석 방법에 대한 고찰)

  • Kim, Keoo-Seok;Nam, Hae-Jung;Park, Owe-Suk;Kim, Hee-Jeong;Cha, Jae-Hoon;Kim, Yoon-Bum
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.19 no.3 s.31
    • /
    • pp.134-145
    • /
    • 2006
  • Objective : This study was carried out to investigate what type of assumption and conditions are needed for the application of various statistical techniques such as descriptive statistics, t-test, analysis of variance, correlation analysis, regression analysis and chi-square test and to evaluate that they are used correctly in the research process. Methods : One more methods of statistical analysis were used in 91 papers among 162 papers selected from the journal of Korean oriental medical Ophthalmology & Otolaryngology & Dermatology from April 2003 to December 2005. So we analysed the type of statistical analysis method in 91 papers(clinical and experimental study) and assessed the their validity of statistical techniques by the check list consisting of 34 items(3 items for validity assessment of descriptive statistics, 6 items for t-test, 7 items for analysis of variance, correlation analysis and regression analysis, respectively, 4 items for chi-square test) Results : 1. The type of 65(40%) cases is experimental trial, the type of 55(34%) cases is case report, the type of 26(16%) cases is clinical trial and the type of 16(10%) cases is review, in 91 papers using statistical techniques among 162 papers selected from the journal of Korean oriental medical Ophthalmology & Otolaryngology & Dermatol-ogy from April 2003 to December 2005. 2. One more methods of statistical analysis were used in the experimental and clinical study. When we classified 125 units using statistical analysis methods in 91 papers according to statistical techniques such as descriptive statistics, t-test, analysis of variance, correlation analysis, regression analysis and chi-square test, the number of independent sample t-test is 33(26%), the number of only descriptive statistics is 28(22%), the number of independent sample t-test is 33(26%), the number of only descriptive statistics is 28(22%), the number of one way ANOVA is 15(12%), the number of non-parametric test 10(8%). 3. After carrying out one way ANOVA, the number of using multiple comparison methods is 15(Scheffe:6(26%), Duncan:4(17%), Dunnett:3(13%), Tukey:2(9%)) out of 23 (total case carrying out one way ANOVA). 8(35%) out of 23 did not enforce multiple comparison methods after carrying out one way ANOVA. 4. From the assessment of validity about 63 cases using statistical techniques(except descriptive statistics), 5(8%) cases are proper, the other 58(92%) are improper, so we recognized a serious misuse of statistical application in our journal. 5. The number of case below 10 sample size in experimental and clinical study(except descriptive statistics) is 31(34%) and frequent. Also the number of case containing no mention of sample size is 41(45%, including culture study). 6. For example of statistical error, there are wrong choice of statistical technique, lack of check on standard assumption(such as standard distribution, equivariance, independence), and so on. Conclusions : We investigated the validity of statistical analysis methods in our journal by check list consisting of 34 items and suggested correct statistical analysis methods. We should practice the spread of education about statistical analysis methods and precis application, enhance objectivity and reliability of our thesis and further correspond with purpose of scientific study.

  • PDF

Usability Comparison between PIN entry schemes (개인식별번호 입력 방식들에 대한 사용편의성 비교)

  • Kim, Chang-Soon;Song, Jeong-Eun;Lee, Mun-Kyu
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.34-39
    • /
    • 2009
  • Four-digit PIN(Personal Identification Number) is a well-known user authentication method used for many applications including ATMs and mobile phones. However, it is vulnerable to shoulder surfing attacks(SSAs). In this paper, we present new PIN entry methods which are secure against SSA and easy to use. We compare the usability and security of these methods with those of the existing methods.

  • PDF

Evaluation of the Completeness of Case Reporting during the 1998 Cheju-do Mumps Epidemic, Using Capture-recapture Methods (Capture-recapture 방법을 이용한 1998년 제주도 볼거리 유행시 보고 자료의 완전성 평가)

  • Kim, Myoung-Hee;Park, Jin-Kyoung;Ki, Mo-Ran;Hur, Young-Joo;Kim, Joung-Soon;Choi, Bo-Youl
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.3
    • /
    • pp.313-322
    • /
    • 2000
  • Objectives : To estimate mumps incidence during the study period and to evaluate the completeness of case reporting. Methods : Capture-recapture methods, originally developed for counting wildlife animals, were used. The data sources were 1) the National Notifiable Communicable Disease Reporting System (NNCDRS; 848 cases), 2) the School Health Reporting System, temporarily administered by the Division of Education (SHRS; 1,026 cases), and 3) a survey of students (785 cases). We estimated the number of unobserved mumps cases by matching the three data sources and fitting loglinear models to the data. We then determined the estimated total number of mumps cases by adding this to the number of observed cases. Completeness was defined as the proportion of observed cases from each source to the total of estimated cases. Results : The total number of observed cases was 1,844 and the total number of estimated cases was 1,935 (95%, CI: $1,878\sim2,070$). The overall completeness was 43.8% of the NNCDRS, 53.0% of the SHRS, and 40.6% of the survey. However, completeness varied by area and age. Conclusion : Although the completeness of NNCDRS data appeared higher than in the past, it is difficult to generalize this result In Korea, it is possible to estimate the size of health hazards relatively cheaply and quickly, by applying capture-recapture methods to various data using a multiple data collection system.

  • PDF