• Title/Summary/Keyword: number and operations

Search Result 2,085, Processing Time 0.033 seconds

A Study on Mathematics Question Item Trend in Elementary School Teacher Selection Test (초등교사 임용 시험에서 수학 교과 문항의 출제 동향 분석)

  • Lee, Jong-hak
    • Journal of the Korean School Mathematics Society
    • /
    • v.18 no.4
    • /
    • pp.431-448
    • /
    • 2015
  • Elementary school teacher selection test has to be implemented for knowledge(MKT) to estimate and to be a step in the expansionary direction. For this, It has to be analyzed closely in terms of teacher's MKT first that questions set from selection tests until now. In this research, some standards were established by type of question, grade, contents field and subject from 84 mathematics questions set at examinations. And it was analyzed concretely by general tendency and produced the results of analysis related to elementary teacher's MKT in elementary school teacher selection test since year 2000. The results showed that descriptive and short answer type was mostly set(71.4%) in type of question and integrated grade type was mostly set(41.7%) in type of grade in elementary school teacher selection test. And in type of contents field, rated from highest to lowest, number and operations(31.0%), measurement(23.8%), figure(15.5%) were set. Textbook/manual(34.5%), solution of problem(26.2%), learning psychology(13.1%) in status of subject were followed in order, but there's no relationship with estimation. This research was based on a standard of precedent study and made an analysis of elementary mathematics questions of selection test since year 2000. Therefore, it has a meaning because of produced results from analysis related to elementary teacher's MKT.

A Tablet PC-Based Music-Making Program for Improving Executive Function of Adolescents With Intellectual Disabilities (지적장애 청소년의 집행기능 향상을 위한 태블릿 PC 기반 음악 만들기 활동)

  • Ji, Kyeongmi
    • Journal of Music and Human Behavior
    • /
    • v.12 no.1
    • /
    • pp.1-21
    • /
    • 2015
  • This study examined the effects of a tablet PC-based music-making program on the executive function of adolescents with intellectual disabilities. Four adolescents with intellectual disabilities participated in this program. Each participant received 45-minute individual sessions twice a week for a total of 16 sessions. The music-making program was designed in the sequence of planning; learning table PC operations; exploring musical elements; making rhythm, melody, and lyrics; composing loop sections; and presentation of the completed music. The Stroop test, Children's Color Trails Test, and Digit Span and Letter-Number sequencing tests were measured at pretest, midtest, and posttest in order to examine changes in executive function. The participants showed increased scores on all three tests. The participants' attention span also increased and their attempts to correct errors during tasks occurred more frequently at posttest. This study supports the effects of the technology-based program on the executive function of adolescents with intellectual disabilities and presents its expanded applicability for adolescents who show low cognitive function and limited motivation for cognitive engagement.

Design of a Low Power Digital Filter Using Variable Canonic Signed Digit Coefficients (가변 CSD 계수를 이용한 저전력 디지털 필터의 설계)

  • Kim, Yeong-U;Yu, Jae-Taek;Kim, Su-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.7
    • /
    • pp.455-463
    • /
    • 2001
  • In this Paper, an approximate processing method is proposed and tested. The proposed method uses variable CSD (VCSD) coefficients which approximate filter stopband attenuation by controlling the precision of the CSD coefficient sets. A decimation filter for Audio Codec '97 specifications has been designed having processor architecture that consists of program/data memory, arithmetic unit, energy/level decision, and sinc filter blocks, and fabricated with 0.6${\mu}{\textrm}{m}$ CMOS sea-of-gate technology. For the combined two halfband FIR filters in decimation filter, the number of addition operations were reduced to 63.5%, 35.7%, and 13.9%, compared to worst-case which is not an adaptive one. Experimental results show that the total power reduction rate of the filter is varying from 3.8 % to 9.0 % with respect to worst-case. The proposed approximate processing method using variable CSD coefficients is readily applicable to various kinds of filters and suitable, especially, for the speech and audio applications, like oversampling ADCs and DACs, filter banks, voice/audio codecs, etc.

  • PDF

Analysis of Elderly Drivers' Accident Models Considering Operations and Physical Characteristics (고령운전자 운전 및 신체특성을 반영한 교통사고 분석 연구)

  • Lim, Sam Jin;Park, Jun Tae;Kim, Young Il;Kim, Tae Ho
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.6
    • /
    • pp.37-46
    • /
    • 2012
  • The number of traffic accidents caused by elderly drivers over the age of 65 has surged over the past ten years from 37,000 to 274,000 cases. The proportion of elderly drivers' accidents has jumped 3.1 times from 1.2% to 3.7% out of all traffic accidents, and traffic safety organizations are pursuing diverse measures to address the situation. Above all, connecting safety measures with an in-depth research on behavioral and physical characteristics of elderly drivers will prove vital. This study conducted an empirical research linking the driving characteristics and traffic accidents by elderly drivers based on the Driving Aptitude Test items and traffic accident data, which enabled the measurement of behavioral characteristics of elderly drivers. In developing the Influence Model, we applied the zero-inflated Poisson (ZIP) regression model and selected an accident prediction model based on the Bayesian Influence in regards to the ZIP regression model and the zero-inflated negative binomial (ZINB) regression model. According to the results of the AAE analysis, the ZIP regression model was more appropriate and it was found that three variables? prediction of velocity, diversion, and cognitive ability? had a relation of influence with traffic accidents caused by elderly drivers.

A Study on the Flow Uniformity and Characteristics of Exhaust gas in Diesel Particulate Filter/Diesel Oxidation Catalyst of Ship Diesel Reduction System by Computational Fluid Dynamics (CFD에 의한 선박용 DPF/DOC내 배기가스의 유동 균일도 및 특성 연구)

  • Kim, YunJi;Han, Danbee;Baek, Youngsoon
    • Clean Technology
    • /
    • v.25 no.2
    • /
    • pp.153-160
    • /
    • 2019
  • As air pollution becomes more serious due to the increased number of diesel vessel operations, ship regulations on harmful emissions strengthen. Therefore, the development of a diesel exhaust after-treatment system for ships is required, and the higher the flow uniformity of the exhaust treatment system, the higher the treatment efficiency. With the computer software ANSYS Fluent, pressure drop and flow uniformity were used in this study to simulate flow rate with and without a baffle in both a Diesel Oxidation Catalyst (DOC) and Diesel Particulate Filter (DPF) system. The system pressure drop was found to be 38 to 40 mbar in the existing system condition, and the flow uniformity was approximately 84 to 92% at the inlet and outlet of the DOC. When the baffle was installed inside the system, the pressure increased and the flow uniformity was lowered due to an increase in flow rate. When the exhaust gas flow was reduced by 50% from $7,548kg\;h^{-1}$ to $3,772kg\;h^{-1}$, the flow uniformity at the inlet and outlet of the DOC increased by approximately 1 to 3% due to the low flow rate. In the case of DPF, the flow uniformity of exhaust gas was 98 to 99% because the uneven flow proceeded after uniformly flowing from the DOC.

Design and Performance Analysis of a DS/CDMA Multiuser Detection Algorithm in a Mixed Structure Form (혼합구조 형태의 DS/CDMA 다중사용자 검파 알고리즘 설계 및 성능 분석)

  • Lim, Jong-Min
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.51-58
    • /
    • 2002
  • The conventional code division multiple access(CDMA) detector shows severe degradation in communication quality as the number of users increases due to multiple access interferences(MAI). This problem thus restricts the user capacity. Various multiuser detection algorithms have been proposed to overcome the MAI problem. The existing detectors can be generally classified into one of the two categories : linear multiuser detection and subtractive interference cancellation detectors. In the linear multiuser detection, a linear transform is applied to the soft outputs of the conventional detector. In the subtractive interference cancellation detection, estimates of the interference are generated and subtracted out from the received signal. There has been great interest in the family of the subtractive interference cancellation detection because the linear multiuser detection exhibits the disadvantage of taking matrix inversion operations. The successive interference cancellation (SIC) and the parallel interference cancellation (PIC) are the two most popular structures in the subtractive interference cancellation detector. The SIC structure is very simple in hardware complexity, but has the disadvantage of increased processing delay time, while the PIC structure is good in performance, but shows the disadvantage of increased hardware complexity. In this paper we propose a mixed structure form of SIC and PIC in order to achieve good performance as well as simple hardware complexity. A performance analysis of the proposed scheme has been made, and the superior characteristics of the mixed structure are demonstrated by extensive computer simulations. 

Conservation Process of Large-earthen ware in Geumgangsa Temple Site - A Study on the Cyanoacrylate Adhesive Used for Large-earthen Ware Joining - (금강사지 출토 대형 토기의 보존 - 대형 토기접합에 사용된 순간 접착제에 대한 연구 -)

  • Lee, Dahae;Hwang, Hyunsung;Shin, Minkyeong
    • Conservation Science in Museum
    • /
    • v.13
    • /
    • pp.1-11
    • /
    • 2012
  • While the project for registering the unregistered relics that had been stored in the relic storage warehouse was in progress, restoration operations were started for the large size pottery pieces that had been excavated from the Geumgangsa Temple Site and it is attempted to explain the pottery pieces and to introduce the process of the overall conservation treatment. About 600 pieces of large size pottery had been separately stored in more than 40 relic boxes in their original damaged condition without making it possible to figure out their shape, size, usage and quantity at all. Due to the enormous number and weight of the pottery pieces, they were, first of all, pre-classified largely into 6 groups of pottery pieces in consideration of the visible features such as pottery thickness, color sense and glaze brilliance, etc. for each kind of pottery raw material. However, as a result of making them adhere together on a temporary basis, they turned out to be only one piece of pottery in reality. In this restoring process, in order to see if the generally used cyanoacrylate adhesive was in fact safe when a very large, heavy and deformed pottery piece was to be put together, its safeness was checked by examining the adhesion velocity, adhesion strength and dissolution velocity for both from low to high viscosities through preliminary experiments. In order to restore the lost parts after putting the existing pieces together, diversified epoxy resins were used to fit their shapes. Considering that the bottom of the restored relic was shaped to be not flat but round without allowing it to stand alone, an exhibition mount was manufactured so that the relic could be stored stably and used readily for exhibition.

A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints (길이에 따라 감소하는 빈도수 제한조건을 고려한 가중화 그래프 패턴 마이닝 기법)

  • Yun, Unil;Lee, Gangin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.125-132
    • /
    • 2014
  • Since frequent pattern mining was proposed in order to search for hidden, useful pattern information from large-scale databases, various types of mining approaches and applications have been researched. Especially, frequent graph pattern mining was suggested to effectively deal with recent data that have been complicated continually, and a variety of efficient graph mining algorithms have been studied. Graph patterns obtained from graph databases have their own importance and characteristics different from one another according to the elements composing them and their lengths. However, traditional frequent graph pattern mining approaches have the limitations that do not consider such problems. That is, the existing methods consider only one minimum support threshold regardless of the lengths of graph patterns extracted from their mining operations and do not use any of the patterns' weight factors; therefore, a large number of actually useless graph patterns may be generated. Small graph patterns with a few vertices and edges tend to be interesting when their weighted supports are relatively high, while large ones with many elements can be useful even if their weighted supports are relatively low. For this reason, we propose a weight-based frequent graph pattern mining algorithm considering length-decreasing support constraints. Comprehensive experimental results provided in this paper show that the proposed method guarantees more outstanding performance compared to a state-of-the-art graph mining algorithm in terms of pattern generation, runtime, and memory usage.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

A Study on Communication Safety and Evaluation Tool in Railway Communication System (열차제어시스템 통신 안정성 및 평가 도구 연구)

  • Kim, Sung-Un;Seo, Sang-Bo;Song, Seung-Mi;Jo, Chan-Hyo;Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.349-356
    • /
    • 2008
  • Put Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.