• Title/Summary/Keyword: execution methods

Search Result 656, Processing Time 0.024 seconds

A Case Study on Student to Student Verbal Interaction on the Acid-Base Titration Experiment Using MBL (MBL을 활용한 산-염기 적정 실험에서의 학생 간 언어적 상호작용에 대한 사례연구)

  • Ryu, Eun-Hee;Lim, Hee-Young;Kang, Seong-Joo;Choi, Byung-Soon
    • Journal of The Korean Association For Science Education
    • /
    • v.28 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • The purpose of this study was to investigate the effects of an MBL instrument in laboratory execution by analyzing an experimental time and student to student interactions in the MBL and traditional method of the acid-base titration experiment. The MBL method used a conductivity sensor and the traditional method used a current meter on the HCl/NaOH titrations. In comparison of the two methods, the traditional method required more time than the MBL and most of the extra time were used in the execution. In the execution, the MBL method showed more numbers of student to student interaction and higher level of verbal interaction than the traditional method.

A Survey of Usability and User-Centered Design Practice in IT industry (IT업계에서의 사용성 및 사용자 중심설계에 관한 현황조사)

  • 지용구
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2003.11a
    • /
    • pp.1231-1232
    • /
    • 2003
  • This paper reports results of a recent survey of 184 Information Technology(IT) development practitioners and 90 User Interface (UI)/usability practitioners. This survey covered a broad range of issues including the respondents' profile, current development environment, usability and user-centered design (UCD) adoption issues in development, overall assessment of usability/UCD in Korea, and the most widely used methods and techniques. The results of this study are expected to provide an empirical basis for usability and UCD planning, training, adoption and execution in IT industry of Korea.

  • PDF

THE CORRECTION OF SECONDARY CLEFT LIP DEFORMITIES (이차구순열 결손의 치료)

  • Park, In-Soon;Yeo, Hwan-Ho;Kim, Young-Kyun;Kim, Su-Gwan;Gi, Jae-Hyu;Lim, Seok-Gyun
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.19 no.2
    • /
    • pp.135-142
    • /
    • 1997
  • Despite the current accomplishments with the repair of cleft lips, the surgical management of the nasal deformity remains a functional and aesthetic dilemma for patients, their families, and reconstructive surgeons. Recent improvements in the understanding and technical execution of te primary cleft lip repair have significantly reduced secondary sequelae and the consequent need for secondary surgical correction. But, secondary surgical corrections are necessary according to numerous factors. Such factors include the secondary surgical corrections are necessary according to numerous factors. Such factors include the severity of the initial deformity, the surgical plan, precision of execution of the primary repair, and success of the postoperative management. We preformed the secondary correction of cleft lip and palate in 11 patients via various methods. In conclusion, primary repair of cleft lip and palate patients is the most important to prevent the secondary deformities, and most of cleft lip and palate with secondary deformities must be treated with combined cheiloplasty and rhinoplasty.

  • PDF

Research on make-or-buy decision making strategy using system dynamics: Focused on Korea's military improvement project (시스템 다이내믹스를 이용한 제조-구매 결정 전략: 한국의 방위력 개선 사업을 중심으로)

  • Choi, Jeong-Hwan;Ko, Seong-Pil;Lee, Jeong-Dong
    • Korean System Dynamics Review
    • /
    • v.13 no.1
    • /
    • pp.159-182
    • /
    • 2012
  • Strategic decision on the execution of national security improvement project is greatly important for the present and future national security. Though, the importance of strategic decision, decision making process has been executed under one-way thinking framework. This research provides a decision-making tool with make-or-buy approach for the national security improvement policy execution methods: foreign purchase and military R&D project, and, via simulation, confirms dynamic change of military capability index respect to change in ratio of foreign purchase and military R&D. A result shows that current ratio of foreign purchases and military R&D is insufficient for national security improvement policy goal. Applying the model from this research provides an appropriate ratio for short term and long term defense strategy and policy goal, and consequent result of increase in national security capability. Thus, this research model can be effectively utilized for national security improvement project.

  • PDF

Extracting Maximum Parallelism for Parallel Computing (병렬 계산을 위한 최대 병렬성 추출 방법)

  • Park, Doo-Soon
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.93-103
    • /
    • 2005
  • Since the most program execution time is consumed in a loop structure, extracting parallelism from sequential loop programs is critical for the faster program execution. Conventional studies for extracting the parallelism are focused mostly on a uniform data dependence distance. In this paper, we proposed data dependency elimination method for a nested loop and extended data dependency elimination method to extract parallelism from the loop with procedure calls. The data dependency elimination method and the extended data dependency elimination method can be applied to uniform and non-uniform data dependency distance. We compared our method with conventional methods using CRAY-T3E for the performance evaluation. The results show that the proposed algorithms are very effective.

  • PDF

Secure Multiplication Method against Side Channel Attack on ARM Cortex-M3 (ARM Cortex-M3 상에서 부채널 공격에 강인한 곱셈 연산 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.943-949
    • /
    • 2017
  • Cryptography implementation over lightweight Internet of Things (IoT) device needs to provide an accurate and fast execution for high service availability. However, adversaries can extract the secret information from the lightweight device by analyzing the unique features of computation in the device. In particular, modern ARM Cortex-M3 processors perform the multiplication in different execution timings when the input values are varied. In this paper, we analyze previous multiplication methods over ARM Cortex-M3 and provide optimized techniques to accelerate the performance. The proposed method successfully accelerates the performance by up-to 28.4% than previous works.

A qualitative research on work scope in dental healthcare hygienists (치과병·의원에 근무하는 치과위생사의 업무 범위에 대한 질적 연구)

  • Moon, Sang-Eun;Hong, Sun-Hwa;Kim, Na-Yeon
    • Journal of Korean society of Dental Hygiene
    • /
    • v.19 no.6
    • /
    • pp.907-918
    • /
    • 2019
  • Objectives: This qualitative research was conducted to clearly find and clinically understand dental hygienists' work experience in order to lay the legal foundation for their work range and safe execution. Methods: From March 1 to April 30, 2019, seven study participants were selected and participated in-depth interviews. Phenomenological research methodology was applied for intensive analysis. Results: They performed jobs that required no professionalism, such as dental assistance, except for scaling. Dental hygienists, nurses' aids, and dental technicians performed the same jobs regardless of difficulty level and legal work range. Dental hygienists failed to accurately recognize their legal work range. Since there was the wide gap between their legal work range and actual work range, it was necessary to expand the work range in line with actual conditions. Conclusions: Given the results, it is necessary to conduct in-depth discussions within the dental circle to make dental hygienists' work execution in line with reality by improving and discussing a legal system for job assignment and expansion of workers. Therefore, it is required to form a plan for the many jobs dental hygienists executed in a clinical setting.

Optimization of Energy Consumption in the Mobile Cloud Systems

  • Su, Pan;Shengping, Wang;Weiwei, Zhou;Shengmei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4044-4062
    • /
    • 2016
  • We investigate the optimization of energy consumption in Mobile Cloud environment in this paper. In order to optimize the energy consumed by the CPUs in mobile devices, we put forward using the asymptotic time complexity (ATC) method to distinguish the computational complexities of the applications when they are executed in mobile devices. We propose a multi-scale scheme to quantize the channel gain and provide an improved dynamic transmission scheduling algorithm when offloading the applications to the cloud center, which has been proved to be helpful for reducing the mobile devices energy consumption. We give the energy estimation methods in both mobile execution model and cloud execution model. The numerical results suggest that energy consumed by the mobile devices can be remarkably saved with our proposed multi-scale scheme. Moreover, the results can be used as a guideline for the mobile devices to choose whether executing the application locally or offloading it to the cloud center.

Design and Implementation of a Monitor Checking the Execution Time of Real-time Object-oriented Programs (실시간 객체지향 프로그램의 실행시간을 감시하는 모니터의 설계 및 구현)

  • Min, Byoung-Joon;Choi, Jae-Young;Kim, Jung-Guk;Kim, Moon-Hae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3804-3814
    • /
    • 2000
  • This paper presents an efficient implementation of a run-time monitor which checks the satisfaction of the timing constraints of real-time object-oriented programs based on a real-time object model called TMO(Time-triggered Messagedtriggered Object). An execution environment of TMO programs on Windows as, WTMOS(Windows TMO System) has been utilized for the implementation and an experimental application for thermostatic control has been developed to analyze the performance of the run-time monitor. We suggest a methodology for application programmers to specify the target methods with the monitoring conditions and an implementation technique which incurs the small cost by effectively distributing the functions of the monitor into the WTMOS and a TMO object.

  • PDF

Application of Value Engineering to Early Design Phases in Construction Projects (건설사업 설계초기단계 VE 적용방안)

  • Lee Seung-Hoon;Koo Kyo-Jin;Hyun Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.3 s.25
    • /
    • pp.156-166
    • /
    • 2005
  • The purpose of this study is to present proper VE application methods to euly design phases. Since VE methodology is more effective on early stage of design phase, the study focused on application of VE methodology in early stage of design process. With the examination of past studies, obstacles of VE application in domestic construction industry are defined. To solve these problems, this paper presents (1) subdivision of VE execution time, (2) an appropriate VE targeting method for construction industry, (3) a resonable and practical function analysis process, and (4) modified design-VE job plan.