• 제목/요약/키워드: computer tools

검색결과 1,688건 처리시간 0.024초

Mixed-Integer Programming based Techniques for Resource Allocation in Underlay Cognitive Radio Networks: A Survey

  • Alfa, Attahiru S.;Maharaj, B.T.;Lall, Shruti;Pal, Sougata
    • Journal of Communications and Networks
    • /
    • 제18권5호
    • /
    • pp.744-761
    • /
    • 2016
  • For about the past decade and a half research efforts into cognitive radio networks (CRNs) have increased dramatically. This is because CRN is recognized as a technology that has the potential to squeeze the most out of the existing spectrum and hence virtually increase the effective capacity of a wireless communication system. The resulting increased capacity is still a limited resource and its optimal allocation is a critical requirement in order to realize its full benefits. Allocating these additional resources to the secondary users (SUs) in a CRN is an extremely challenging task and integer programming based optimization tools have to be employed to achieve the goals which include, among several aspects, increasing SUs throughput without interfering with the activities of primary users. The theory of the optimization tools that can be used for resource allocations (RA) in CRN have been well established in the literature; convex programming is one of them, in fact the major one. However when it comes to application and implementation, it is noticed that the practical problems do not fit exactly into the format of well established tools and researchers have to apply approximations of different forms to assist in the process. In this survey paper, the optimization tools that have been applied to RA in CRNs are reviewed. In some instances the limitations of techniques used are pointed out and creative tools developed by researchers to solve the problems are identified. Some ideas of tools to be considered by researchers are suggested, and direction for future research in this area in order to improve on the existing tools are presented.

The Evaluation Tool and Process for Effective Education Outcomes Measurement and Analysis of Computer Education

  • Kim, Young-Tak;Sim, Gab-Sig
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권9호
    • /
    • pp.149-156
    • /
    • 2016
  • This paper is concerned with education courses operating practices for basic computer literacy training. In this study, we propose an example for students to effectively measure and evaluate the achievement of defined ability in the performance measurement and analysis, learning objectives and learning outcomes set in operation throughout the course. Through research and development use case presents the tools for teaching method and effective and objective measurement of the related subjects. And based on the results, we propose the possibility of utilizing NCS-based course operation and education certification. In this study, the measurement process is based on the association with the objective of the development and operation, and measurement tools, measuring tools for measuring learning outcomes associated with the curriculum design methods for the measurement and evaluation of the case of the operation of the course units of learning outcomes and the method proposed.

건물 주광환경 평가도구의 비교분석에 관한 연구 (Study on Comparative Analysis of Daylight Evaluation Tools for Building Environment)

  • 박경은;김준태
    • 한국태양에너지학회 논문집
    • /
    • 제22권4호
    • /
    • pp.26-34
    • /
    • 2002
  • Daylighting in building is very important as it has an effect on work performance as well as on their visual health. It is also regarded as a good energy conservation measure in saving energy used for lighting. There are many daylighting evaluation tools such as empirical equations, tables, nomograms, diagrams, protractors, computer simulation, scale models. This study conducted initial daylight measurements to analyze luminous environment in classrooms of elementary school and comparative analysis on three daylighting evaluation tools, such as daylight factor calculation formula, the graphic method with BRE Protractor and computer simulation with Adeline 3.0. It is found that the computer simulation tool produced the closest result to actual measurements of luminous environment in elementary school classroom, and the other simplified tools made appropriate results so that they can be used in the early stage of daylighting design process.

OWL 기반의 온톨로지 도구 비교분석 (A Comparison of Ontology Tools Based on OWL)

  • 임형신;황윤영;엄동명;이규철
    • 한국한의학연구원논문집
    • /
    • 제12권1호
    • /
    • pp.1-12
    • /
    • 2006
  • Recently according to the WIPO's policy of preserving traditional knowledge, constructing the database of traditional knowledge is in progress. To maximize the retrieving power of the knowledge resource systems which will be developed later, it is necessary to construct the ontology for the concepts used by traditional knowledge. In order to construct the ontology systematically, a standardized ontology representation method is needed, and OWL(Web Ontology Language) is the recommendation of W3C(World Wide Web Consortium) and is widely used. Ontology tools can be used to ease the construction of OWL ontology, but no research about the comparison of OWL ontology tools exists. This paper compares the tools of OWL by an objective point of view and with that one can make a decision of using the appropriate tool for constructing OWL ontologies.

  • PDF

A Study on Tools for Android Malware Analysis

  • Almokhtar, Ali;Kwon, Dong-Hyun;Paek, Yun-Heung
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.510-512
    • /
    • 2014
  • Malware Analysis tools are being main topic research for many mobile security companies, in this survey, we are trying to go through the most popular tools used to find out the malicious codes and suspected android programs through reverse engineering process. There are so many malware tools have been made and implemented and some of them are efficient enough and others are quite slow and consuming high processing, however we are going to compare briefly some of them.

Visualizer: An Interactive Execution Tool for Java Programs

  • Kim, Hyung-Rok;Kim, Yong-Seok
    • 산업기술연구
    • /
    • 제26권B호
    • /
    • pp.215-220
    • /
    • 2006
  • Effective use of debugging in computer science education is a topic that has received little attention. Existing tools either are too overwhelming for the novice or are too basic and inflexible. Furthermore, the integration of the debugger into complex IDEs have unfamiliar debuggers from students, resulting in a harmful proliferation of console I/O. In this paper, a new stand-alone educational debugging tool is presented, with simple but powerful tools for easily observing and modifying program execution state. This tool is analyzed from an user perspective, and is compared with existing tools.

  • PDF

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.257-265
    • /
    • 2021
  • Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.

Honeypots Tools Study and Analysis

  • Al-Jameel, Sultan;Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.162-173
    • /
    • 2021
  • The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.

Verifying Orthologous Paralogenes using Whole Genome Alignment

  • Chan, P.Y.;Lam, T.W.;Yiu, S.M.
    • 한국생물정보학회:학술대회논문집
    • /
    • 한국생물정보시스템생물학회 2005년도 BIOINFO 2005
    • /
    • pp.109-112
    • /
    • 2005
  • Identifying orthologous paralogenes is a fundamental problem in comparative genomics and can facilitate the study of evolutionary history of the species. Existing approaches for locating paralogs make use of local alignment based algorithms such as BLAST. However, there are cases that genes with high alignment scores are not paralogenes. On the other hand, whole genome alignment tools are designed to locate orthologs. Most of these tools are based on some unique substrings (called anchors) in the corresponding orthologous pair to identify them. Intuitively, these tools may not be useful in identifying orthologous paralogenes as paralogenes are very similar and there may not be enough unique anchors. However, our study shows that this is not true. Paralogenes although are similar, they have undergone different mutations. So, there are enough unique anchors for identifying them. Our contributions include the followings. Based on this counter-intuitive finding, we propose to employ the whole genome alignment tools to help verifying paralogenes. Our experiments on five pairs of human-mouse chromosomes show that our approach is effective and can identify most of the mis-classified paralog groups (more than 80%). We verify our finding that whole genome alignment tools are able to locate orthologous paralogenes through a simulation study. The result from the study confirms our finding.

  • PDF

시각적 사고를 통한 소셜미디어 비즈니스모델 설계에 대한 연구 (Study on Social Media Business Model Design through Visual Thinking)

  • 박상혁;성행남;조현달
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.289-297
    • /
    • 2012
  • It is a recent trend to utilize a variety of visual tools(process map, mindmap, ERD) to create, when we create the design of information system or business models. Theses visual tool is standardized tools as process map or BPMN, on the other hand, there is also a non-standardized tools as mindmap. The utilization of the non-standardized tools as mindmap in startups is a increasing trend, because of the order the release of creative thinking to design new business model. Mindmaps can be divided into pen-based mindmap(of hand-written) and computer-based mindmap. This study was conducted under the premise of a different thinking pattern, when you take advantage of pen-based mindmap and computer-based mindmap. In other words, the pen-based mindmap is a tool for deductive reasoning and the computer-based mindmap is a tool would be more appropriate for inductive thinking. The purpose of this study is to investigate these relationships through experiments. In this study propose guidelines how visual tools, when designing a social media business models.