• Title/Summary/Keyword: Source key

Search Result 1,096, Processing Time 0.055 seconds

An Analysis of Open Source GIS Software Ecosystem in Korea (국내 오픈소스 공간정보 소프트웨어 생태계 분석)

  • Kang, Youngok;Kang, AeTti;Kwon, HoeYoon
    • Spatial Information Research
    • /
    • v.22 no.6
    • /
    • pp.67-79
    • /
    • 2014
  • These days open source softwares are being introduced and applied in many countries in the world. Especially, both government and private companies tend to become an spearhead in vitalizing the open source software. In this paper we try to check the degree of vitalizations in open source GIS software and to draw implications in vitalizing ecosystem of open source GIS software. Key players of open source GIS software ecosystem are government, private companies, academic and research institutes, and nonprofit foundations. Government does not have very little policies related to the investment and the support of open source GIS software. Private companies related to the open source GIS software are very few in the number and do not have any clear business model to make a profit. Academic and research institutes are weak in using the open source GIS software, which can be an major obstacle to cultivate software developers. OSGeo Korean branch, established in 2009, is the only nonprofit foundation in Korea which makes an effort to vitalize the open source GIS software, but its results are not very strong up to now in view of both quality and invigoration. In order to vitalize the open source GIS software ecosystem, lots of efforts of key players are needed. Especially, government efforts are very important because it can provide a trigger in vitalizing the open source GIS software ecosystem. The tasks that government should propel are R&D investment, test bed projects in the area of public sector, professional manpower training, and international cooperation and marketing.

A Study on Christian Educational Implications for 6 Key Competencies of 2015 Revised National Curriculum (2015 개정 교육과정의 6개 핵심역량에 대한 기독교교육적 함의)

  • Seo, Mikyoung
    • Journal of Christian Education in Korea
    • /
    • v.63
    • /
    • pp.221-253
    • /
    • 2020
  • The purpose of this study is to define the key competency as Christian(in another word: Christian key competency) and to interpret the six key competencies of the 2015 revised curriculum in a Christian educational way. Also as an alternative to the key competencies model of the 2015 revised curriculum, this study aims to materialize the formation of a Christian key competencies model based on Christian faith. This study derived 'faith' from the key competencies as Christian throughout preceding research analysis. The 'faith' of the key competencies as Christian means the ability to know oneself, and to know the world and God within the knowledge of the Bible (knowledge of God) in the personal relationship with God, and also it is the ability to think, judge, and act with biblical values, Christian world view, and Christian self-identity. The key competency 'faith' could be the basis (standard) of motivation, attitude and the value of all competencies in cultivation and exercise. The model of Christian key competencies has the structure in which each six key competencies become to be cultivated based on the Christian key competency called "faith." Based on the structure, the six key competencies of the 2015 revised curriculum were interpreted and explained from the perspective of Christian education. In the self-management competency, self-identity can be correctly formed in relations with transcendent God. In aesthetic emotional competency, the empathic understanding of human beings comes from the understanding of the image of God, the supreme beauty, the source of beauty. About the community competency, human community is the source of God who created the universe, human and all of things. It is because a Christian community is a community within the relationship of Trinity God, Nature and others. Therefore regions, countries, and the world become one community. Communication competency first stem from good attitudes toward yourself and others with respectful mind. It comes from an understanding of Christian human beings. Also, there is a need of having a common language for communications. The common language is the Bible that given to us for our communicative companionship. Through the language of the Bible, God made us to know about God, human being and the creative world, and also made us to continue to communicate with God, others and the world. For having the knowledge-information processing competency, a standard of value for the processing and utilization of knowledge and information is required. The standard should be the basis of moral and ethical values for human respect. About creative thinking competency, the source of creativity is God who created the world. Human beings who have the image of God own creative potential. As well as, creativity has different expression forms depending on individual preferences and interests, and different approaches will be made depending on each individual's importance and achievement. Individual creativity can be found through education, and it can be embodied by converging knowledge, skills and experience.

A new conjugate gradient algorithm for solving dynamic load identification

  • Wang, Lin J.;Deng, Qi C.;Xie, You X.
    • Structural Engineering and Mechanics
    • /
    • v.64 no.2
    • /
    • pp.271-278
    • /
    • 2017
  • In this paper, we propose a new conjugate gradient method which possesses the global convergence and apply it to solve inverse problems of the dynamic loads identification. Moreover, we strictly prove the stability and convergence of the proposed method. Two engineering numerical examples are presented to demonstrate the effectiveness and speediness of the present method which is superior to the Landweber iteration method. The results of numerical simulations indicate that the proposed method is stable and effective in solving the multi-source dynamic loads identification problems of practical engineering.

Basic Study on Geothermal System Application Possibility of a Detached House (단독주택의 지열시스템 적용 가능성에 대한 기초연구)

  • Shin, Hee-Il;Jang, Tea-Ik
    • Proceedings of the SAREK Conference
    • /
    • 2008.06a
    • /
    • pp.794-800
    • /
    • 2008
  • Due to high oil prices and global warming problems, researching an alternative energy source and decreasing the energy usage will be the key in the future. Unlike other alternative energy sources, geothermal energy is less dependent on the surrounding environment. Geothermal energy is the ideal energy source for buildings due to the simple and space saving installation. The system is semi permanent once it is installed and this will help reduce the energy usage in controlling the climate in buildings. Geothermal energy does not emit carbon dioxide and other gases that are harmful to the environment. Therefore geothermal energy will be the key in solving high oil prices and a decrease in fossil fuels by applying the geothermal energy system to detached house to counter future energy crisis.

  • PDF

A Study on Geothermal System Applicability of a Detached House (단독주택의 지열시스템 적용 가능성에 대한 연구)

  • Shin, Cheulsoo;Jang, Taeik
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.23 no.5
    • /
    • pp.551-558
    • /
    • 2012
  • Due to high oil prices and global warming problems, researching an alternative energy source and decreasing the energy usage will be the key in the future. Unlike other alternative energy sources, geothermal energy is less dependent on the surrounding environment. Geothermal energy is the ideal energy source for buildings due to the simple and space saving installation. The system is semi permanent once it is installed and this will help reduce the energy usage in controlling the climate in buildings. Geothermal energy does not emit carbon dioxide and other gases that are harmful to the environment. Therefore geothermal energy will be the key in solving high oil prices and a decrease in fossil fuels by applying the geothermal energy system to homes to counter future energy crisis.

Optimal Power Allocation and Outage Analysis for Cognitive MIMO Full Duplex Relay Network Based on Orthogonal Space-Time Block Codes

  • Liu, Jia;Kang, GuiXia;Zhu, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.924-944
    • /
    • 2014
  • This paper investigates the power allocation and outage performance of MIMO full-duplex relaying (MFDR), based on orthogonal space-time block codes (OSTBC), in cognitive radio systems. OSTBC transmission is used as a simple means to achieve multi-antenna diversity gain. Cognitive MFDR systems not only have the advantage of increasing spectral efficiency through spectrum sharing, but they can also extend coverage through the use of relays. In cognitive MFDR systems, the primary user experiences interference from the secondary source and relay simultaneously, owing to full duplexing. It is therefore necessary to optimize the transmission powers at the secondary source and relay. In this paper, we propose an optimal power allocation (OPA) scheme based on minimizing the outage probability in cognitive MFDR systems. We also analyse the outage probability of the secondary user in noise-limited and interference-limited environments in Nakagami-m fading channels. Simulation results show that the proposed schemes achieve performance improvements in terms of reducing outage probability.

Analysis of the Internal Electrical Characteristics of Electronic Power Transformers

  • Yi, Yang;Mao, Cheng-Xiong;Wang, Dan;Lu, Ji-Ming
    • Journal of Power Electronics
    • /
    • v.13 no.5
    • /
    • pp.746-756
    • /
    • 2013
  • The modularized subunit of an electronic power transformer (EPT) is a series connection of two H-bridge voltage-source converters and a DC-DC converter with a high-frequency isolation transformer (HFIT). On the basis of cascading and paralleling the modularized subunits, EPT can be used in high-voltage and large-current applications in the power system. This paper discusses the steady state analysis of the modularized subunit of EPT. Theoretical analysis considers the influences of the two H-bridge voltage-source converters on the two sides of the DC-DC converter. We deduce the formulas of the theoretical calculation on the internal electrical characteristics of EPT (e.g., the voltages of the DC-bus capacitor and the primary side peak current of the HFIT). This paper provides guidance on the design and selection of EPT key elements (e.g., the DC-bus capacitors and HFIT). Experimental results are obtained from a single subunit of a laboratory model rated at 962 V, 15 kVA. All calculations, simulations, and experiments confirm the theoretical analysis of the subunit of EPT.

Resource Allocation Algorithm Based on Simultaneous Wireless Information and Power Transfer for OFDM Relay Networks

  • Xie, Zhenwei;Zhu, Qi;Zhao, Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5943-5962
    • /
    • 2017
  • A resource allocation algorithm based on simultaneous wireless information and power transfer (SWIPT) to maximize the system throughput is proposed in orthogonal frequency division multiplexing (OFDM) relay networks. The algorithm formulates the problem under the peak power constraints of the source and each subcarrier (SC), and the energy causality constraint of the relay. With the given SC allocation of the source, we give and prove the optimal propositions of the formulated problem. Then, the formulated problem could be decomposed into two separate throughput maximization sub-problems by setting the total power to transfer energy. Finally, several SC allocation schemes are proposed, which are energy priority scheme, information priority scheme, balanced allocation scheme and exhaustive scheme. The simulation results reveal that the energy priority scheme can significantly reduce computational complexity and achieve approximate performance with the exhaustive scheme.

Achievable Rate of Beamforming Dual-hop Multi-antenna Relay Network in the Presence of a Jammer

  • Feng, Guiguo;Guo, Wangmei;Gao, Jingliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3789-3808
    • /
    • 2017
  • This paper studies a multi-antenna wireless relay network in the presence of a jammer. In this network, the source node transmits signals to the destination node through a multi-antenna relay node which adopts the amplify-and-forward scheme, and the jammer attempts to inject additive signals on all antennas of the relay node. With the linear beamforming scheme at the relay node, this network can be modeled as an equivalent Gaussian arbitrarily varying channel (GAVC). Based on this observation, we deduce the mathematical closed-forms of the capacities for two special cases and the suboptimal achievable rate for the general case, respectively. To reduce complexity, we further propose an optimal structure of the beamforming matrix. In addition, we present a second order cone programming (SOCP)-based algorithm to efficiently compute the optimal beamforming matrix so as to maximize the transmission rate between the source and the destination when the perfect channel state information (CSI) is available. Our numerical simulations show significant improvements of our propose scheme over other baseline ones.

Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks (소스 라우팅 기반의 이동 Ad-hoc 네트워크에서 안전한 데이터 전송 방법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1188-1193
    • /
    • 2007
  • This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.