• Title/Summary/Keyword: 컴퓨터시스템교육

Search Result 1,332, Processing Time 0.027 seconds

The Chinese Characters Learning Contents Based on Gesture Recognition Using HMM Algorithm (HMM을 이용한 제스처 인식 기반 한자 학습 콘텐츠)

  • Song, Dae-Hyeon;Kim, Dong-Min;Lee, Chil-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1067-1074
    • /
    • 2012
  • In this paper, we proposed a contents of Chinese characters learning based on gesture recognition using HMM(hidden markov model) algorithm. Input image of the system is obtained in 3-dimensional information from the TOF camera, and the method of gesture recognition is consisted of part of forecasting user's posture in two infrared images and part of recognizing gestures from continuous poses. In the communication between human and computer, this system provided convenience that user can manipulate it easily by not using any further equipment but action. Because this system raise immersion and interest by using two large display and various multimedia factor, it can maximize information transmission. The edutainment Chinese character contents proposed in this paper provide educational effect that use can master Chinese character naturally with interest, and it can be expected a synergy effect via content experience because it is based on gesture recognition.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF

Misconception of the Force in Scientifical Gifted Through the Knowledge State Analysis (지식상태 분석을 통한 과학영재들의 힘에 관한 오개념)

  • Park, Sang-Tae
    • Journal of Gifted/Talented Education
    • /
    • v.20 no.3
    • /
    • pp.1027-1037
    • /
    • 2010
  • Comparing to the other subject, the relationship among physics contents is strong from the perspective of knowledge order as grades go up. That is, The things already that students learned, are learning and will learn are closed related from grade to grade. We expect students to be proactive and creative in studying physics, which is the goal of 21th century, analyzing their knowledge structure based on the knowledge order through assessment. Especially, using computer system, we provide students with substantial feedback for the assessment as well as objective validity is increased along with speedy and exact process in a bid to help students' mathematical understanding grow. This paper seeks to analyze the data from assessment applying knowledge spaces of the scientifical gifted in the force and the motion concept to applicate on teaching method.

BomBart : Web-based Programming Environment Support to Graphic User Interface (그래픽 유저 인터페이스를 지원하는 웹 기반 프로그래밍 환경 '봄밭'의 설계 및 구현)

  • Cheon, Junseok;Song, Jiwon;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.317-325
    • /
    • 2017
  • There has been a growing interest in programming education recently. However, to use most programming languages the corresponding compiler and IDE have to be installed on computers. To tackle this issue, though there developed several web-based programming environment including Eclipse Che and JDOODLE, most of them does not support GUI nor Korean programming languages. This paper proposes a web-based programming environment called Bombart, which supports Saesark, a Korean programming language, with GUI output. It also supports a console-based input and output. To support both kinds of interfaces, two compiling subsystems are designed and implemented. To test the effectiveness of the GUI support of Bombart, all the Java tutorial codes on GUI are translated into Saesark and executed on top of Bombart. According to this test, 81.42% of codes can be successfully converted and executed.

Industrial Communication Gateway Design of Communications Module Additive layer type (통신 모듈 적층형 산업용 통신 게이트웨이 설계)

  • Eum, Sang-hee;Nam, Jae Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.133-136
    • /
    • 2019
  • Recently, many industrial devices are facing protocol compatibility problems with external monitoring and control systems. This paper designed an industrial communication gateway that can support the transformation of industrial communication protocol using multi-layered communication module. Industrial communication gateways have a structure that connects individual communication modules using rs485 serial communication to multiple layers. Each communication module consisted of analog data card, a digital data card LAN, and a CAN-enabled card. The main board processor used Atmega micro-processor, and the rs485 serial slot was placed to have a multi-layer communication module structure. These additive layer type communication modules support analog and digital I/O functions and LAN and CAN for wide use in industrial communication control and monitoring.

  • PDF

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

A Design of AI Cloud Platform for Safety Management on High-risk Environment (고위험 현장의 안전관리를 위한 AI 클라우드 플랫폼 설계)

  • Ki-Bong, Kim
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.2
    • /
    • pp.01-09
    • /
    • 2022
  • Recently, safety issues in companies and public institutions are no longer a task that can be postponed, and when a major safety accident occurs, not only direct financial loss, but also indirect loss of social trust in the company and public institution is greatly increased. In particular, in the case of a fatal accident, the damage is even more serious. Accordingly, as companies and public institutions expand their investments in industrial safety education and prevention, open AI learning model creation technology that enables safety management services without being affected by user behavior in industrial sites where high-risk situations exist, edge terminals System development using inter-AI collaboration technology, cloud-edge terminal linkage technology, multi-modal risk situation determination technology, and AI model learning support technology is underway. In particular, with the development and spread of artificial intelligence technology, research to apply the technology to safety issues is becoming active. Therefore, in this paper, an open cloud platform design method that can support AI model learning for high-risk site safety management is presented.

A Study on Creative Teaching Methods using Blockchain Media (블록체인 미디어를 활용한 창의적 교수법 연구)

  • Baek, Jinwook
    • Journal of Creative Information Culture
    • /
    • v.5 no.2
    • /
    • pp.173-182
    • /
    • 2019
  • Recently, creative teaching methods have received a lot of attention in the university community. Creative teaching methods can maximize the effectiveness of the creative education through the voluntary participation of students. One of the most important skills in creative teaching methods is communication because many students are passive in their real classes. An economic reward system helps to improve students' communication skills because it motivates students to study harder. Therefore, a blockchain media based on an economic reward system can be useful teaching tools. This paper proposes a creative teaching method using blockchain media to improve communication skills. The proposed method consists of eight steps, and it was applied to classes for the last three years. The results show that the proposed method helps students improve their communication skills.

An Qualification Level Model for Efficient Management of Cyber Security Workforce (사이버보안 인력의 효율적 관리를 위한 자격등급 모델 설계)

  • Jung-Ho Eom;Hong-Jun Kim;Youn-Sung Choi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.61-69
    • /
    • 2022
  • When a large-scale cyber attack or terrorism occurs and the country suffers enormous damage or poses a fatal threat to security, social interest in nurturing cybersecurity workforce increases. In addition, the government often suggests policies and guideline to train cybersecurity workforce. However, the system that can systematically manage trained cyber workforce after they are employed in related organizations or companies is still weak. Software workforce has a standardized qualification level model, so appropriate jobs are set and managed for each level. Cyber workforce also need a specialized qualification level model that takes into account their career, academic background, and education&training performance. By assigning a qualification level, the duties that can be performed for each level should be set, and the position and duty of the department should also be assigned in consideration of the level. Therefore, in this paper, we propose a qualification level model for cyber security workforce.

A Method for Determining Face Recognition Suitability of Face Image (얼굴영상의 얼굴인식 적합성 판정 방법)

  • Lee, Seung Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.295-302
    • /
    • 2018
  • Face recognition (FR) has been widely used in various applications, such as smart surveillance systems, immigration control in airports, user authentication in smart devices, and so on. FR in well-controlled conditions has been extensively studied and is relatively mature. However, in unconstrained conditions, FR performance could degrade due to undesired characteristics of the input face image (such as irregular facial pose variations). To overcome this problem, this paper proposes a new method for determining if an input image is suitable for FR. In the proposed method, for an input face image, reconstruction error is computed by using a predefined set of reference face images. Then, suitability can be determined by comparing the reconstruction error with a threshold value. In order to reduce the effect of illumination changes on the determination of suitability, a preprocessing algorithm is applied to the input and reference face images before the reconstruction. Experimental results show that the proposed method is able to accurately discriminate non-frontal and/or incorrectly aligned face images from correctly aligned frontal face images. In addition, only 3 ms is required to process a face image of $64{\times}64$ pixels, which further demonstrates the efficiency of the proposed method.