• Title/Summary/Keyword: embedded informatics

Search Result 43, Processing Time 0.022 seconds

The End User Computing Strategy of Using Excel VBA in Promoting Nursing Informatics in Taiwan

  • Chang, Polun;Hsu, Chiao-Ling;Hou, I-Ching;Tu, Ming Hsiang;Liu, Che-Wei
    • Perspectives in Nursing Science
    • /
    • v.5 no.1
    • /
    • pp.45-58
    • /
    • 2008
  • The nursing informatics has been booming in Taiwan since 2003 when we started to use the end user computing strategy to promote it. We used Excel 2003, which was well known and used by our clinical nurses, as well as the embedded VBA to teach them how simple information applications could and should be built to meet their information management needs in order to support their professional responsibility. Many cost-effective projects were successfully done and the importance and potentials of nursing informatics started to be noticed. Our training strategy and materials are introduced in this paper.

  • PDF

Development of Run-Time Analysis Tool for Embedded Applications (임베디드 어플리케이션을 위한 수행시간 분석 도구의 개발)

  • Bae, HyangYeon;Ha, OK-Kyoon;Kang, Mun-Hye;Jun, Yong-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.5-6
    • /
    • 2016
  • 항공전자와 같은 실시간 시스템을 위한 어플리케이션은 신뢰성을 보장하는 것이 중요하다. 기존의 동적 분석 도구가 사용하는 Sampling기법이나 Instruction측정은 성능 저하 구간을 올바르게 탐지하지 못하기 때문에 프로그램의 품질을 상승시키기 어렵고 디버깅 비용을 증가시킨다. 본 논문은 이러한 문제의 해결을 위해 함수 별 실행 시간을 측정하고, 함수의 수행 구조를 추적하여 성능저하구간을 직관적으로 식별할 수 있는 수행시간 분석 도구를 제시한다.

  • PDF

Light emitting thin film structures based on organic luminophors embedded in porous alumina matrixes

  • Gorokh, G.G.;Labunov, V.A.;Smirnov, A.G.;Kukhta, A.V.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.315-318
    • /
    • 2002
  • Light emitting thin film structures based on organic luminophors embedded in porous alumina matrixes are discussing. The optical properties of the luminophors in a matrix differ greatly from their properties in usual crystalline state or in a solution and they depend on the concentration of luminophors molecules of up to 10-2 mol/l. Successful experiments on filling of pores with organic luminophors and the investigation of their luminescent and optical properties were carried out.

  • PDF

An Image Hiding Scheme by Linking Pixels in the Circular Way

  • Chan, Chi-Shiang;Tsai, Yuan-Yu;Liu, Chao-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1718-1734
    • /
    • 2012
  • The proposed method in this paper is derived from Mielikainen's hiding method. However, there exist some significant differences between two methods. In Mielikainen's method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.

Coupling shape-memory alloy and embedded informatics toward a metallic self-healing material

  • Faravelli, Lucia;Marzi, Alessandro
    • Smart Structures and Systems
    • /
    • v.6 no.9
    • /
    • pp.1041-1056
    • /
    • 2010
  • This paper investigates the possibility of a strategy for an automatic full recover of a structural component undergoing loading-unloading (fatigue) cycles: full recover means here that no replacement is required at the end of the mission. The goal is to obtain a material capable of self healing earlier before the damage becomes irreversible. Attention is focused on metallic materials, and in particular on shape memory alloys, for which the recovering policy just relies on thermal treatments. The results of several fatigue tests are first reported to acquire a deep understanding of the physical process. Then, for cycles of constant amplitude, the self-healing objective is achieved by mounting, on the structural component of interest, a suitable microcontroller. Its input, from suitable sensors, covers the current stress and strain in the alloy. The microcontroller elaborates from the input the value of a decisional parameter and activates the thermal process when a threshold is overcome.

AN IMPROVED JPEG2000 STEGANOGRAPHY USING QIM AND ITS EVALUATION BY STEGANALYSIS

  • Ishida, Takayuki;Yamawaki, Kazumi;Noda, Hideki;Niimi, Michiharu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.466-469
    • /
    • 2009
  • This paper presents a modified QIM-JPEG2000 steganography which improves the previous JPEG2000 steganography using quantization index modulation (QIM). Post-embedding changes in file size and PSNR by the modified QIM-JPEG2000 are smaller than those by the previous QIM-JPEG2000. Steganalysis experiments to determine whether messages are embedded in given JPEG2000 images show that the modified QIM-JPEG2000 is more secure than the previous QIMJPEG2000.

  • PDF

SOME RESULTS OF SELF MAP NEAR-RINGS

  • Cho, Yong-Uk
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.1_2
    • /
    • pp.523-527
    • /
    • 2011
  • In this paper, We initiate a study of zero symmetric and constant parts of near-rings, and then apply these to self map near-rings. Next, we investigate that every near-ring can be embedded into some self map near-ring, and every zero symmetric near-ring can be embedded into some zero symmetric self map near-ring.

A study of the effect analysis and development of informatics ethics education program based on subject integrations (교과융합 정보윤리교육 프로그램의 개발과 효과 분석)

  • Kim, SungYul;Lee, OkHwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.19 no.4
    • /
    • pp.21-31
    • /
    • 2016
  • As the science and technology advances, the side effects of information and communications technology use become a social issue and the social demands to strengthen the informatics ethics in the curriculum of elementary and secondary schools becomes great. The contents of informatics ethics education is included in the current curriculum for elementary and secondary school, but they are embedded in multiple subjects without the holistic guidelines for the informatics ethics curriculum. Therefore it can have duplications of the contents or missing among subjects as those subjects are elective in the secondary school. In this study, we proposed a holistic curriculum for informatics ethics education and developed the education program based on subject integrated curriculum model and the cyber internet ethics education model to solve problems of informatics ethics education. The program was practised for 291 students of $10^{th}$ graders for 5 months and effectiveness was proven by the high attainment of ethics understanding. This subject integrated education program is proposed to solve the structural problems of informatics ethics education in 2015 curriculum.

Power-aware Real-time Task Scheduling in Dependable Embedded Systems (신뢰도를 요구하는 임베디드 시스템에서의 저전력 태스크 스케쥴링)

  • Kim, Kyong Hoon;Kim, Yuna;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.1
    • /
    • pp.25-29
    • /
    • 2008
  • In this paper, we provide an adaptive power-aware checkpointing scheme for fixed priority-based DVS scheduling in dependable real-time systems. In the provided scheme, we analyze the minimum number of tolerable faults of a task and the optimal checkpointing interval in order to meet the deadline and guarantee its specified reliability. The energy-efficient voltage level at a fault arrival is also analyzed and used in the recovery of the faulty task.

  • PDF

Policy-Based QoS Management for SLA-Driven Adaptive Routing

  • Katsikogiannis, George;Mitropoulos, Sarandis;Douligeris, Christos
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.301-311
    • /
    • 2013
  • This paper proposes a policy-based quality of service (QoS) management framework for adaptive routing decisions. We present an approach considering interior gateway protocol (IGP) for path discovery mechanisms and QoS-aware policies for configuring the network elements. The integration of the aforementioned modules into this policy-based network management (PBNM) system is demonstrated by conducting experiments in a real environment, the hellenic public administration network SYZEFXIS. These experiments combine different traffic conditioning mechanisms through event detectors, consider IP service level agreement mechanisms that interoperate with the PBNM system and analyze the enforcement of IGP and QoS policies. Finally, validation and measurement tools are used to prove the efficiency of this framework. It is shown that this architecture offers significantly increased performance and learning capabilities, while the PBNM system achieves adaptive QoS routing through automated configuration considering the avoidance of suboptimal routing issues or under-performance conditions of the network entities.