2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
The Development of the Simulation Modeling System and Modeling Ability Evaluation
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.1-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research intended to develop and evaluate the computer simulation software of pendulum, and explore junior high students' scientific modeling ability. Firstly, the researcher analyzed pendulum modeling software development. Secondly, this researcher considered the validity of the software and the assessments of the whole system, and he revised the software to make it more suitable for the purposes of junior high students' pendulum modeling with computer simulation. Finally, the purpose of this research is to contend the suggestions of application of the software for junior high science teacher, and to develop synthetic software of pendulum modeling in this research. The conclusions are as follows: 1. There are six kinds of variables of simulation pendulum: mass, length, angle, force, air-force, and width of string. Based on the modeling processes, the researcher needed to develop relevant software tools to help students' modeling, such as Time-recorder, grid chart and the film of Galileo's history of science. 2. The fuzzy synthetic evaluation was implemented for assessing modeling ability. Five aspects, with totally 19 sub items together, are contained in the evaluation system, which can be regarded as the evaluation for student's modeling ability. 3. Via the evaluation in discipline content, media interface and the user attitude, etc., this simulation software is suitable for the stage of junior high student pendulum modeling.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.17-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Unique characteristics of biological systems are described, and similarities are made to certain computing architectures. The security challenges posed by these characteristics are discussed. A method of securely isolating portions of a design using introspective capabilities of a fine-grain self-configurable device is presented. Experimental results are discussed, and plans for future work are given.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.29-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The purpose of this research is to develop a comprehensive modeling for measuring dynamics of brand power. We define brand power as brand specific coefficients to yield the sales volume for each period. The modeling consists of multinomial log it model for each product category, the brand-specific coefficients, mixture modeling and fuzzy clustering algorithm. We apply our modeling to TV scanner data in Tianjin China. The results show 5 brands have 12 to 23 times change on their brand power in a year. The lasting time of brand power spreads from 1 week to 12 weeks.
Policy based Agents in Wireless Body Sensor Mesh Networks for Patient Health Monitoring
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.37-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
There is presently considerable research interest in using wireless and mobile technologies in patient health monitoring particularly in hospitals and nursing homes. For health monitoring,, an intelligent agent based hierarchical architecture has already been published by one of the authors of this paper. Also, the technique of monitoring and notifying the health of patients using an intelligent agent, to the concerned hospital personnel, has also been proposed. We now present the details of the functioning of four main intelligent agents, viz., the nurse agent, the sensor agent, the database agent and the ward boy agent, for intimating the health information to the concerned doctor in the hospital, based on certain policies relevant to the hospital. The policies, in our case have been worked out based on the temperature parameter monitored by the “"nurse agent”". We have considered just as an example, the physiological parameter viz., the body temperature monitoring, for our policy based agent implementation. The implementation has been carried out using JADE-LEAP agent development kit. The details are presented in the paper.
Terrain Mapping and Classification in Outdoor Environments Using Neural Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.51-61
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper describes a three-dimensional terrain mapping and classification technique to allow the operation of mobile robots in outdoor environments using laser range finders. We propose the use of a multi-layer perceptron neural network to classify the terrain into navigable, partially navigable, and non-navigable. The maps generated by our approach can be used for path planning, navigation, and local obstacle avoidance. Experimental tests using an outdoor robot and a laser sensor demonstrate the accuracy of the presented methods.
Application Protocol Design for Collaborative Learning
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology vol.2 no.4 2009.12 pp.63-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This presentation will describe the effort to construct an effective educational support environment and to develop meaningful educational applications, This system is a framework supporting interactive collaboration which enables both teachers and students to interact in real-time from remote sites. The purpose of this collaboration is to bring interactive multimedia learning in real-time. In order to induce collaborative learning, this paper proposes protocol design process that shares knowledge awareness information for learning environments. The protocol helps learner to mediate and recognize collaborators in the shared knowledge space. We are developing an open-ended collaborative learning support system, which is called prototype system for protocol design, and facilities to share individual knowledge and to learn through collaboration. This system architecture can be viewed as divided in four logical parts: the infrastructure, the service functions, the advanced service functions and the application. The session management is creates/destroys the sessions and performs the functions controlling the QOS by detaching the network load. Session manager include: session control, floor control, media instance control, packet interpreter, event interpreter, media server instance, media interface, network interface private application interface and media server control.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.