• Title/Summary/Keyword: design computing

Search Result 2,903, Processing Time 0.028 seconds

Study on the Scale Effect of Viscous Flows around the Ship Stern (선미 점성 유동장에 미치는 척고효과에 관한 연구)

  • Kwak, Y.K.;Min, K.S.;Oh, K.J.;Kang, S.H.
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.34 no.1
    • /
    • pp.1-10
    • /
    • 1997
  • Viscous flow around actual ship is calculated by an use of RANS equations. The propriety of this computing method, usefulness to hull form design and the scale effect which is the effect of viscous flow depending on the scale of ship model are investigated. Reynolds stress is modelled by using k-${\varepsilon}$ turbulence model and the law of wall is applied near the body. Body fitted coordinates are introduced for the treatment of the arbitrary 3-dimensional shape of the ship hull form. The transformed equations in the computational domain are numerically solved by an employment of FVM. In the calculation of pressure, SIMPLE method is adopted and the solution of the discretized equation is obtained by the line-by-line method with the use of TDMA The calculations of two ships, 4410 TEU container carrier and 50,000 DWT class bulk carrier, are performed at model and actual ship scale. The results are compared and discussed with the model test results which are viscous resistance, nominal wake distribution at propeller plane and limiting streamline on the hull surface. They describe the effect of stem form and the scale effect very well. In particular, the calculated nominal wake distribution and limiting streamline are agreed qualitatively with the experiments and the viscous resistance values are estimated within ${\pm}5%$ difference from the resistance tests.

  • PDF

Python-based Software Education Model for Non-Computer Majors (컴퓨터 비전공자를 위한 파이썬 기반 소프트웨어 교육 모델)

  • Lee, Youngseok
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.73-78
    • /
    • 2018
  • Modern society has evolved to such an extent that computing technology has become an integral part of various fields, creating new and superior value to society. Education on computer literacy, including the ability to design and build software, is now becoming a universal education that must be acquired by everyone, regardless of the field of study. Many universities are imparting software education to students to improve their problem-solving ability, including to students who are not majoring in computers. However, software education contains courses that are meant for computer majors and many students encounter difficulty in learning the grammar of programming language. To solve this problem, this paper analyzes the research outcomes of the existing software education model and proposes a Python-based software education model for students who are not majoring in computer science. Along with a Python-based software education model, this paper proposed a curriculum that can be applied during one semester, including learning procedures, and teaching strategies. This curriculum was applied to a liberal arts class and a meaningful result was derived. If the proposed software education model is applied, the students will be interested in the computer literacy class and improve their computational thinking and problem-solving ability.

Implementation of A Multiple-agent System for Conference Calling (회의 소집을 위한 다중 에이전트 시스템의 구현)

  • 유재홍;노승진;성미영
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.205-227
    • /
    • 2002
  • Our study is focused on a multiple-agent system to provide efficient collaborative work by automating the conference calling process with the help of intelligent agents. Automating the meeting scheduling requires a careful consideration of the individual official schedule as well as the privacy and personal preferences. Therefore, the automation of conference calling needs the distributed processing task where a separate calendar management process is associated for increasing the reliability and inherent parallelism. This paper describes in detail the design and implementation issues of a multiple-agent system for conference calling that allows the convener and participants to minimize their efforts in creating a meeting. Our system is based on the client-sewer model. In the sewer side, a scheduling agent, a negotiating agent, a personal information managing agent, a group information managing agent, a session managing agent, and a coordinating agent are operating. In the client side, an interface agent, a media agent, and a collaborating agent are operating. Agents use a standardized knowledge manipulation language to communicate amongst themselves. Communicating through a standardized knowledge manipulation language allows the system to overcome heterogeneity which is one of the most important problems in communication among agents for distributed collaborative computing. The agents of our system propose the dates on which as many participants as possible are available to attend the conference using the forward chaining algorithm and the back propagation network algorithm.

  • PDF

Knowledge as Marketing Message : Design and Analysis of Human-Reader Based Personal Experience Management Business Model (마케팅 메시지로서의 지식 : Human-Reader 기반의 개인 경험 관리 비즈니스 모델 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.17-43
    • /
    • 2010
  • This research considers the role of knowledge as marketing message, designs and analyses the personal experience management (PEM) business model using Human-Reader system. It is difficult to save and manage person's daily experience and relevant contents due to the lack of proper infrastructure and system. On the contrary, using Human-Reader infrastructure, person's experience and various relevant contents can be easily saved and managed because seamlessness between offline and online and the various devices that person can always carry along in ubiquitous environment. Since person can store and manage information, contents and advertisements through Human-Reader system and u-PEMS, marketing messages and advertisements do not have to be repetitive and stimulating. Instead, marketing messages and advertisements in Human-Reader environment should be granting values that can be saved and managed. We propose various scenarios, processes and its issues. And we analyze the expected value of RFID tag used on the proposed business model by so-called 'Tag Evaluation Model' and assess the assumptions that are basis of the proposed business model for evaluate the feasibility of the u-PEM business model.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

Mobile Cloud Context-Awareness System based on Jess Inference and Semantic Web RL for Inference Cost Decline (추론 비용 감소를 위한 Jess 추론과 시멘틱 웹 RL기반의 모바일 클라우드 상황인식 시스템)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • The context aware service is the service to provide useful information to the users by recognizing surroundings around people who receive the service via computer based on computing and communication, and by conducting self-decision. But CAS(Context Awareness System) shows the weak point of small-scale context awareness processing capacity due to restricted mobile function under the current mobile environment, memory space, and inference cost increment. In this paper, we propose a mobile cloud context system with using Google App Engine based on PaaS(Platform as a Service) in order to get context service in various mobile devices without any subordination to any specific platform. Inference design method of the proposed system makes use of knowledge-based framework with semantic inference that is presented by SWRL rule and OWL ontology and Jess with rule-based inference engine. As well as, it is intended to shorten the context service reasoning time with mapping the regular reasoning of SWRL to Jess reasoning engine by connecting the values such as Class, Property and Individual which are regular information in the form of SWRL to Jess reasoning engine via JessTab plug-in in order to overcome the demerit of queries reasoning method of SparQL in semantic search which is a previous reasoning method.

Desgin of a Spatial QueryExecutor using Tag Technique (태그 기법을 이용한 공간 질의 수행기의 설계)

  • Lee, Chan-Geun;Park, Ho-Hyeon;Lee, Yong-Ju;Jeong, Jin-Wan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.543-552
    • /
    • 1999
  • The iterator technique which is used for implementing physical operators of the query executor is known for its efficiency and extensibility. The most widely used technique for processing an operator on spatial objects is to process by dividing it into the filter step and the refinement step. Recently, there was a research for an optimizer which can generate more efficient query execution plans than those of traditional methods by separating a spatial operator into filter and refinement steps in the level of the object algebra. But, traditional query executors were not designed considering such query execution plans. So they have no function of transmitting the result of the filter operation between operators. We propose two methods, the probe technique and the tag technique, which transmit the result of the filter operator when using the iterator in the query execution plan in which operators are separated by filter/refinement steps and other operators can be allowed between the steps. Whereas the probe technique extends the state record within an operator, the tag technique stores the result of a filter step in an intermediate result in the form of the tag. Based on the comparison of these methods, we design and implement a query executor using the tag technique that is superior in extensibility. The implemented query executor can execute operations defined in the Spatial Object Algebra(SOA) to process an extended OQL for spatial queries.

Design and Implementation of a Physical Network Separation System using Virtual Desktop Service based on I/O Virtualization (입출력 가상화 기반 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템 설계 및 구현)

  • Kim, Sunwook;Kim, Seongwoon;Kim, Hakyoung;Chung, Seongkwon;Lee, Sookyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.506-511
    • /
    • 2015
  • IOV is a technology that supports one or more virtual desktops, and can share a single physical device. In general, the virtual desktop uses the virtual IO devices which are provided by virtualization SW, using SW emulation technology. Virtual desktops that use the IO devices based on SW emulation have a problem in which service quality and performance are declining. Also, they cannot support the high-end application operations such as 3D-based CAD and game applications. In this paper, we propose a physical network separation system using Virtual Desktop Service based on HW direct assignments to overcome these problems. The proposed system provides independent desktops that are used to access the intranet or internet using server virtualization technology in a physical desktop computer for the user. In addition, this system can also support a network separation without network performance degradation caused by inspection of the network packet for logical network separations and additional installations of the desktop for physical network separations.

TeloSIM: Instruction-level Sensor Network Simulator for Telos Sensor Node (TeloSIM: Telos 형 센서노드를 위한 명령어 수준 센서네트워크 시뮬레이터)

  • Joe, Hyun-Woo;Kim, Hyung-Shin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1021-1030
    • /
    • 2010
  • In the sensor network, many tiny nodes construct Ad-Hoc network using wireless interface. As this type of system consists of thousands of nodes, managing each sensor node in real world after deploying them is very difficult. In order to install the sensor network successfully, it is necessary to verify its software using a simulator beforehand. In fact Sensor network simulators require high fidelity and timing accuracy to be used as a design, implementation, and evaluation tool of wireless sensor networks. Cycle-accurate, instruction-level simulation is the known solution for those purposes. In this paper, we developed an instruction-level sensor network simulator for Telos sensor node as named TeloSlM. It consists of MSP430 and CC2420. Recently, Telos is the most popular mote because MSP430 can consume the minimum energy in recent motes and CC2420 can support Zigbee. So that TeloSlM can provide the easy way for the developers to verify software. It is cycle-accurate in instruction-level simulator that is indispensable for OS and the specific functions and can simulate scalable sensor network at the same time. In addition, TeloSlM provides the GUI Tool to show result easily.