• Title/Summary/Keyword: instructions

Search Result 1,407, Processing Time 0.028 seconds

Implementation of Wireless Control and Image Monitoring Robot using ARM 9 Embedded System (ARM 9 임베디드 시스템에 의한 무선 제어 및 영상 감시 로봇 구현)

  • Yun, Hyo-Won;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.166-168
    • /
    • 2007
  • This paper is dealing with how to control of a client robot's movement for instructions from a server PC and a wireless andremote control Robot that sends the server information of images for monitoring. To implement this. 802.11x WLAN with TCP/IP socket programming is used to get the driving instructions from the server PC and control movements of the robot such as a forward, backward and directions. As well as this, ARM9 cored PAX255 embedded processor and Linux OS is used for the function transmitting BMP format of 320 ${\times}$ 240 pixel for stopped image data.

  • PDF

A Development of Checklists on the Cognitive Conflict Process Model Application in Science Concept Learning (인지갈등을 통한 개념수업 절차 모형의 점검틀 고안)

  • Kwon, Nan-Joo;Kwon, Jae- Sool
    • Journal of The Korean Association For Science Education
    • /
    • v.16 no.3
    • /
    • pp.239-248
    • /
    • 1996
  • Many science teaching models have been devised and published for the students' conceptual change by researchers. However, the science teachers have been confused with so many models to be used in teaching science. Since the models are composed of ambiguous statements, it seems to be difficult for the teachers to understand their characteristics and natures. Therefore, the models were difficult to be adopted in science instructions. In this study, the researcher developed two checklists which were devised especially for the teachers who apply the Cognitive Conflict Process Model (the Procedural Teaching Model using Cognitive Conflict Strategy) in Science Concept Instruction. One is for planning instructions using the model, the other is for examining or analysing them. Each of them consisted of 20 items and 33 items, respectively. Using these checklists, the Cognitive Conflict Process Model can be checked whether it was applied properly in actual instruction or not.

  • PDF

Initial Placement of Removable Partial Dentures (가철성 국소의치의 장착)

  • Shin, Soo-Yeon
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.29 no.3
    • /
    • pp.299-307
    • /
    • 2013
  • The overall objective of fitting removable partial dentures at initial placement is to ensure that the patient is given the best possible start with the new prostheses. This may be achieved by checking that: (1) final inspection of the prosthesis, (2) seating of the RPD framework, (3) evaluation of denture base adaptation, (4) assessment of denture base peripheral extensions, (5) occlusal adjustment, (6) remounting the prosthesis, and (7) instructions to the patient.

Standardization of Quality Management and Product Safety Sign in Korea (국내 품질경영 및 공산품 안전표지 표준화 대상 연구)

  • Lee, Ik-Seong
    • Journal of Applied Reliability
    • /
    • v.15 no.3
    • /
    • pp.176-180
    • /
    • 2015
  • A defect on the product safety display is defined by a failure to prevent the damage caused by the inappropriate explanation, direction, and caution to warn the users of the related risks. In other words, it lacks the sufficient instructions or caution for proper use and is unable to furnish the possible danger of the product and the instructions to deal with it. The defect is the responsibility of the manufacturers who are supposed to provide the adequate information so as to prevent injuries of the users. However, in order to prove the product safety display defective, there should be a comprehensive consideration in many different ways such as social norms (such as property and expectation of the product), usage form, indication of the expected risk, and awareness of consumer about the harm and possibility of avoidance of danger. The purpose of this research is to propose the content and types of standardized indication of safety in the industrial product by collecting and analyzing domestic safety information.

NHS: A Novel Hybrid Scheduling for ILP

  • You, Song-Pei;Mashiro Sowa
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.310-313
    • /
    • 2000
  • This paper presents a new scheduling method for ILP processing called NHS(Novel Hybrid Scheduling). It concerns not only exploiting as much ILP as possible like other state-of-the-art scheduling scheme, but also choosing the most important instructions among many ready-to-execute instructions to processors in order to reduce the execution time under limited hardware resource. At the heart of NHS is a conception called CCP(Complex Critical Path), an extension of CP(Critical Path). By using CCP, compiler not only can get a global information of the whole program to extract ILP, but also can collecting data dependence information and control flow information. The paper also presents the simulation results, to date, of our attempts to study the NHS scheduling method. The results indicate good potential for this scheduling method.

  • PDF

Consecutive Operand-Caching Method for Multiprecision Multiplication, Revisited

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.27-35
    • /
    • 2015
  • Multiprecision multiplication is the most expensive operation in public key-based cryptography. Therefore, many multiplication methods have been studied intensively for several decades. In Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES2011), a novel multiplication method called 'operand caching' was proposed. This method reduces the number of required load instructions by caching the operands. However, it does not provide full operand caching when changing the row of partial products. To overcome this problem, a novel method, that is, 'consecutive operand caching' was proposed in Workshop on Information Security Applications 2012 (WISA2012). It divides a multiplication structure into partial products and reconstructs them to share common operands between previous and next partial products. However, there is still room for improvement; therefore, we propose a finely designed operand-caching mode to minimize useless memory accesses when the first row is changed. Finally, we reduce the number of memory access instructions and boost the speed of the overall multiprecision multiplication for public key cryptography.

Simulation for Shop Floor Control

  • Cho, Hyunbo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1996.05a
    • /
    • pp.15-15
    • /
    • 1996
  • A shop floor control system (SFCS) is the central part of a CIM system used to control the activities of several pieces of manufacturing equipment (e.g., NC machines, robots, conveyors, AGVs, AS/RS). The SFCS receives orders and related process plans, and then performs selecting a specific process routing, allocating resources, scheduling the workpieces, downloading the processing instructions (e.g., RS-274 instructions for NC machines, VAL II programs for robot), monitoring the progress of activities, detecting and recovering from errors, and preparing reports on the status of the manufacturing system. Simulation has been utilized in discovering control policies used for resolving shop floor be control problems such as resource contentions, part dispatching, deadlock. The simulation model must be designed to respond to real-time data coming from a shop floor. However, to rapidly build a realtime simulation model of SFCS cannot be easily accomplished. This talk is to address an automatic program generator of discrete event simulation model for shop floor control from process plans and resource models. The program generator is capable of constructing complete discrete simulation models for multi-product and multi-stage flexible manufacturing systems.

  • PDF

Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.12-16
    • /
    • 2013
  • Sensor network is one of the strongest technologies for various applications including home automation, surveillance system and monitoring system. To ensure secure and robust network communication between sensor nodes, plain-text should be encrypted using encryption methods. However due to their limited computation power and storage, it is difficult to implement public key cryptography, including elliptic curve cryptography, RSA and pairing cryptography, on sensor networks. However, recent works have shown the possibility that public key cryptography could be made available in a sensor network environment by introducing the efficient multi-precision multiplication method. The previous method suggested a broad rule of multiplication to enhance performance. However, various features of sensor motes have not been considered. For optimized implementation, unique features should be handled. In this paper, we propose a fully optimized multiplication method depending on a different specification for sensor motes. The method improves performance by using more efficient instructions and general purpose registers.

Exploration and Practice in Training Research Mathematics Teachers in the Middle Schools Located in the Countryside of Western China

  • Ding, Fengchao
    • Research in Mathematical Education
    • /
    • v.11 no.4
    • /
    • pp.265-274
    • /
    • 2007
  • The middle school mathematics teachers of the countryside in western China have little chance to further their education and strengthen their research abilities. In this program, we should offer them chance to learn new educational ideas and teaching methods. There will be demonstration lectures and video teaching of course standards followed by group discussion and personalized instructions. These activities prepare the teachers to give their own demonstration lectures. This again is followed by additional personalized instructions. The teachers come to the program with very limited knowledge of these techniques but will leave with the ability to write educational scientific research papers.

  • PDF

A Study on Scenario-based Web Application Security Education Method

  • Gilja So
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.149-159
    • /
    • 2023
  • Web application security education that can provide practical experience is needed to reduce damage caused by the recent increase in web application vulnerabilities and to strengthen security. In this paper, we proposed a scenario-based web application education method, applied the proposed method to classes, and analyzed the results. In order to increase the effectiveness of scenario-based education, a real-life practice environment to perform scenarios and instructions to be performed by learners are needed. As an example of the proposed method, instructions to be performed by learners from the viewpoint of the attacker and the victim were shown in a practice environment to teach XSS and SQL injection vulnerabilities. After applying the proposed method to the class for students majoring in cyber security, when the lecture evaluation results were analyzed, it was shown that the learner's interest, understanding, and major ability all improved.